Proxy signatures for delegating signing operation
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
A novel efficient (t,n) threshold proxy signature scheme
Information Sciences: an International Journal
An efficient proxy-protected signature scheme based on factoring
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
Hi-index | 0.00 |
In proxy signature, the original signer can delegate his signature power to the proxy signer. Due to the extensive application of proxy signature, some schemes have been presented, but there is not a general model for proxy signature scheme, especially for the scheme with good properties. In this paper, we give the first generic model and security model for proxy-protected anonymous proxy signature, in which only the proxy signer can sign the messages for the original signer. Finally, we give one concrete scheme according to the model as example.