Proxy signatures for delegating signing operation
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
On the Structure of Delegation Networks
CSFW '98 Proceedings of the 11th IEEE workshop on Computer Security Foundations
A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem
IEEE Transactions on Knowledge and Data Engineering
Comments on "A Practical (t,n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem'
IEEE Transactions on Knowledge and Data Engineering
Improvement of Multi-Proxy Signature Scheme
CIT '04 Proceedings of the The Fourth International Conference on Computer and Information Technology
A Modified (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem
ICITA '05 Proceedings of the Third International Conference on Information Technology and Applications (ICITA'05) Volume 2 - Volume 02
Aggregate and verifiably encrypted signatures from bilinear maps
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Identity based delegation network
Mycrypt'05 Proceedings of the 1st international conference on Progress in Cryptology in Malaysia
Multi-proxy signatures based on diffie-hellman problems allowing repeated delegations
HSI'05 Proceedings of the 3rd international conference on Human Society@Internet: web and Communication Technologies and Internet-Related Social Issues
Proxy structured multisignature scheme from bilinear pairings
ISPA'04 Proceedings of the Second international conference on Parallel and Distributed Processing and Applications
A threshold proxy signature scheme using self-certified public keys
ISPA'04 Proceedings of the Second international conference on Parallel and Distributed Processing and Applications
A Security and Privacy Preserving E-Prescription System Based on Smart Cards
Journal of Medical Systems
Hi-index | 0.00 |
Delegation of signing capability is a common practice in various applications Mambo etal proposed a proxy signatures as a solution for delegation of signing capability Proxy signatures allow a designated proxy signer to sign on behalf of an original signer After the concept of proxy signature scheme was proposed, many variants are proposed to support more general delegation setting To capture all possible delegation structures, the concept of delegation network was introduced by Aura, and an ID-based delegation network was proposed by Chow etal In the computational point of view, their solution requires E pairing operations and N elliptic curve scalar multiplications where E and N are the number of edges and nodes in a delegation structure, respectively In this paper, we proposed an efficient ID-based delegation network which requires only E pairing operations Moreover, we modify our delegation network, and the modified scheme requires only N pairing operations In general, E is larger than N and E increases according to the complexity of the network So the modified delegation network is remarkably efficient than the previous delegation network.