ID-based efficient and proactive threshold proxy signature in the standard model

The security of existing identity-based threshold proxy signature schemes were almost proven in the random oracle model,and each proxy signer’s proxy signature key was fixed in the valid period.A(t,n) ID-based proactive threshold proxy signature scheme(IBTPTS) was presented by using the publicly ver...

Full description

Saved in:
Bibliographic Details
Main Authors: YU Yi-ke1, ZHENG Xue-feng2
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2011-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74419804/
Tags: Add Tag
No Tags, Be the first to tag this record!