Attacks on One Designated Verifier Proxy Signature Scheme
In a designated verifier proxy signature scheme, there are three participants, namely, the original signer, the proxy signer, and the designated verifier. The original signer delegates his or her signing right to the proxy signer, then the proxy signer can generate valid signature on behalf of the o...
Saved in:
Main Author: | Baoyuan Kang |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2012-01-01
|
Series: | Journal of Applied Mathematics |
Online Access: | http://dx.doi.org/10.1155/2012/508981 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
New certificateless aggregate signature scheme with universal designated verifier
by: Zhi-yan XU, et al.
Published: (2017-11-01) -
Forward secure proxy signature scheme
by: WANG Xiao-ming, et al.
Published: (2005-01-01) -
Certificateless-based efficient aggregate signature scheme with universal designated verifier
by: Yu-lei ZHANG, et al.
Published: (2015-02-01) -
Provably secure and efficient proxy signature scheme
by: Jie ZENG, et al.
Published: (2014-08-01) -
Practical group signature scheme with verifier-local revocation
by: LI Ji-guo, et al.
Published: (2011-01-01)