×
The analysis shows that the program meets multiple proxy blind signature, which should meet the blinded, unforgeability to distinguish between resistance and ...
This paper analyzes two proxy signature schemes' security, and proves that they exist loopholes. Xu's ID-based proxy signature scheme without trusted PKG is ...
As a variation of ordinary digital signature scheme, a proxy signature scheme enables a proxy signer to sign messages on behalf of the original signer.
Missing: Analysis | Show results with:Analysis
To avoid the key escrow problem, we propose an ID-based blind signature and proxy blind signature without trusted PKG. If the dishonest PKG impersonates an ...
A proxy signature scheme allows an entity to delegate its signing capability to another entity (proxy) in such a way that the proxy can sign messages on behalf ...
Missing: trusted PKG blind multi-
Bibliographic details on Analysis of an ID-based proxy signature scheme without trusted PKG and a proxy blind multi-signature scheme.
To avoid the key escrow problem, we propose an ID-based blind signature and proxy blind signature without trusted PKG. If the dishonest PKG impersonates an ...
In a proxy multi-signature scheme, a designated proxy signer can generate the signature on behalf of a group of original signers. To our best knowledge, ...
multi-proxy signature scheme without bilinear maps. Kim et al. [12] constructed a provably secure ID-based proxy signature scheme based on the lattice problems.
Abstract—This paper analyzes two proxy signature schemes' security, and proves that they exist loopholes. Xu's ID-based proxy signature scheme without ...