![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Nonrepudiable proxy multi-signature scheme
The concept of proxy signature introduced by Mambo, Usuda, and Okamoto allows a designated person, called a proxy signer, to sign on behalf of an original signer. However, most existing proxy signature schemes...
-
Article
A new threshold proxy signature scheme from bilinear pairings
Based on the GDH signature (short signature scheme) a probabilistic signature scheme is proposed in this paper with security proof. Then a new threshold proxy signature from bilinear pairings is proposed as we...
-
Chapter and Conference Paper
A Threshold Proxy Signature Scheme Using Self-Certified Public Keys
So far, all of proposed threshold proxy signature schemes are based on public key systems with certificates and most of them use Shamir’s threshold secret share scheme. Self-certified public key system has att...
-
Chapter and Conference Paper
Secure Delegation-by-Warrant ID-Based Proxy Signcryption Scheme
In this paper, we first construct a security model for delegation-by-warrant ID-based proxy signcryption schemes and formalize notions of security for them. To the best of our knowledge, no related work has be...
-
Chapter and Conference Paper
Constructing Secure Warrant-Based Proxy Signcryption Schemes
Proxy signcryption, proposed by Gamage et al. [1], is a cryptographic primitive, which combines the functionality of a proxy signature scheme with that of an encryption. But to date, no formal definitions of s...
-
Chapter and Conference Paper
An Efficient Proxy-Protected Signature Scheme Based on Factoring
Proxy signature is an active cryptographic research area, and a wide range of literature can be found nowadays suggesting improvement and generalization of existing protocols in various direction. However, mos...
-
Chapter and Conference Paper
Constructing Secure Proxy Cryptosystem
Proxy cryptosystem was first proposed by Mambo and Okamoto, for the delegation of the power to decrypt ciphertexts. However, to our knowledge, there is no reasonable mode aimed at this cryptographic notion. In...
-
Chapter and Conference Paper
Encryption Based on Reversible Second-Order Cellular Automata
In this paper, we present a novel cryptosystem based on reversible second-order cellular automata. The cryptosystem is featured by its large key space and high speed due to cellular automata’s parallel informa...
-
Chapter and Conference Paper
On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme
Signcryption denotes a cryptographic method, which can process encryption and digital signature simultaneously. So, adopting such schemes, computational cost of encryption and signature compared to traditional...
-
Chapter and Conference Paper
Certificateless Threshold Signature Schemes
We analyze the relationship and subtle difference between the notion of certificateless public key cryptography (CL-PKC) and identity-based schemes without a trusted private key generator (PKG), then propose a...
-
Chapter and Conference Paper
Factoring-Based Proxy Signature Schemes with Forward-Security
The property of forward-security can be used to reduce the potential damages caused by key exposure. However, none of the existing proxy signature schemes has taken forward-security into consideration. And mos...
-
Chapter and Conference Paper
Efficient ID-Based Proxy Signature and Proxy Signcryption Form Bilinear Pairings
In this paper, based on bilinear pairings, we would like to construct an identity based proxy signature scheme and an identity based proxy signcryption scheme without secure channel. We also analyze the two pr...
-
Chapter and Conference Paper
A Generalized Proxy Signature Scheme Based on the RSA Cryptosystem
In proxy signature schemes, original signers delegate proxy signers to sign messages on behalf of original signers. Based on the RSA cryptosystem, a generalized proxy signature scheme is proposed. The proposed...
-
Chapter and Conference Paper
Two Proxy Signcryption Schemes from Bilinear Pairings
Proxy signcryption is a cryptographic primitive which combines the functionalities of a proxy signature scheme and a signcryption scheme. In this paper, based on bilinear pairings, we would like to propose two...
-
Chapter and Conference Paper
A Novel ID-Based Partial Delegation with Warrant Proxy Signature Scheme
A novel ID-based proxy-protected signature scheme based on identity information is presented in this paper. We review the concept ID-Based signature introduced by Shamir, define the security notion of an ID-Ba...
-
Chapter and Conference Paper
Security of an Efficient ID-Based Authenticated Key Agreement Protocol from Pairings
Authenticated key agreement protocols are essential for secure communications in open and distributed environments. In 2004, Ryu et al. proposed an efficient two-party identity-based authenticated key agreemen...
-
Chapter and Conference Paper
Efficient Password-Based Authentication and Key Exchange Scheme Preserving User Privacy
With the flourish of applications over the wired /wireless networks, how to keep user’s privacy has drawn growing concerns in recent years. Although the issue of user anonymity has been addressed in digital si...
-
Chapter and Conference Paper
Security Model of Proxy-Multi Signature Schemes
In a proxy multi-signature scheme, a designated proxy signer can generate the signature on behalf of a group of original signers. Although some work has been done in proxy-multi signature schemes, until now th...
-
Chapter and Conference Paper
Identity Based Key Insulated Signature
Exposure of secret keys can be the most devastating attack on a signature scheme since such that security is entirely lost. In a certificated based environment, the certification revocation list (CRL) can be u...
-
Chapter and Conference Paper
Remote Authentication with Forward Security
Password authentication has been accepted as an easy-to-use solution in network environment to protect unauthorized access to a remote server. Although many schemes have been proposed, none of them can achieve...