ID-based efficient and proactive threshold proxy signature in the standard model
The security of existing identity-based threshold proxy signature schemes were almost proven in the random oracle model,and each proxy signer’s proxy signature key was fixed in the valid period.A(t,n) ID-based proactive threshold proxy signature scheme(IBTPTS) was presented by using the publicly ver...
Saved in:
Main Authors: | YU Yi-ke1, ZHENG Xue-feng2 |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2011-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74419804/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Universal composable threshold signature
by: HONG Xuan1, et al.
Published: (2009-01-01) -
Forward secure proxy signature scheme
by: WANG Xiao-ming, et al.
Published: (2005-01-01) -
ID-based transitive signature schemes without random oracle
by: MA Xiao-long1, et al.
Published: (2010-01-01) -
Provably secure certificate less blind proxy re-signatures
by: Tao FENG, et al.
Published: (2012-09-01) -
Identity-based ring signature scheme under standard model
by: ZHANG Yue-yu, et al.
Published: (2008-01-01)