A digital signature scheme secure against adaptive chosen-message attacks
SIAM Journal on Computing - Special issue on cryptography
Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
A security architecture for computational grids
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
A Digital Nominative Proxy Signature Scheme for Mobile Communication
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
A Strong Proxy Signature Scheme with Proxy Signer Privacy Protection
WETICE '02 Proceedings of the 11th IEEE International Workshops on Enabling Technologies: nfrastructure for Collaborative Enterprises
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
SCN '08 Proceedings of the 6th international conference on Security and Cryptography for Networks
An efficient anonymous proxy signature scheme with provable security
Computer Standards & Interfaces
Security proofs for signature schemes
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Collision-free accumulators and fail-stop signature schemes without trees
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Efficient ID-based blind signature and proxy signature from bilinear pairings
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
A new type of proxy ring signature scheme with revocable anonymity and no info leaked
MCAM'07 Proceedings of the 2007 international conference on Multimedia content analysis and mining
An identity-based proxy signature scheme from pairings
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
ID-Based proxy signature using bilinear pairings
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
Identity-based proxy signature from pairings
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Hi-index | 0.00 |
Anonymous authentication is an important means of authorizing a user without identification. It serves as a breakthrough to enhance the privacy of the user and yet preserve the security of the system. Due to limited bandwidth, permanent connections between customers and servers are unnecessary and impracticable. To ensure service availability to the customers distributed in the networks, the server must delegate his rights to other parties in the systems. In the paper, to realize anonymous authentication and delegating right, we put forth a new primitive: controllable anonymous proxy signature with revocation, by combining proxy signature, ring signature and the proposed new knowledge-proof-signauture technology. Then we give formal definitions of security and show them to be satisfiable by constructing an instantiation under RSA assumption proven secure in the random oracle model.