Proxy re-signature scheme based on isomorphisms of polynomial
Most of the existing proxy resignature schemes were based on the hardness of big integer factoring,discrete logarithm,elliptic curve.However,none of them can resist the attack by a quantum computer.Motivated by these concerns,a new proxy resignature scheme was proposed.By employing secret affine tra...
Saved in:
| Main Authors: | Hui-xian LI, Lu SHAO, Liao-jun PANG |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Editorial Department of Journal on Communications
2017-02-01
|
| Series: | Tongxin xuebao |
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/thesisDetails#10.11959/j.issn.1000-436x.2017024 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Provably secure certificate less blind proxy re-signatures
by: Tao FENG, et al.
Published: (2012-09-01) -
Design and implementation of proxy-protected proxy signature based on SM2
by: Qing-xiao GUO, et al.
Published: (2017-09-01) -
An Algorithm of (n, t)-Threshold Proxy Signature with an Arbitrator
by: E. A. Tolyupa
Published: (2013-08-01) -
Lattice-Based Certificateless Proxy Re-Signature for IoT: A Computation-and-Storage Optimized Post-Quantum Scheme
by: Zhanzhen Wei, et al.
Published: (2025-08-01) -
Evaluation of Computationally Efficient Identity-Based Proxy Signatures
by: Saddam Hussain, et al.
Published: (2025-01-01)