An identity-based society oriented signature scheme with anonymous signers
Information Processing Letters
A Strong Proxy Signature Scheme with Proxy Signer Privacy Protection
WETICE '02 Proceedings of the 11th IEEE International Workshops on Enabling Technologies: nfrastructure for Collaborative Enterprises
Group-oriented signature scheme with distinguished signing authorities
Future Generation Computer Systems - Special issue: Computational chemistry and molecular dynamics
On the efficiency of nonrepudiable threshold proxy signature scheme with known signers
Journal of Systems and Software
A novel ID-based designated verifier signature scheme
Information Sciences: an International Journal
Certificate-based verifiably encrypted signatures from pairings
Information Sciences: an International Journal
Cryptanalysis and improvement of a threshold proxy signature scheme
Computer Standards & Interfaces
A secure identity-based proxy multi-signature scheme
Information Sciences: an International Journal
An efficient anonymous proxy signature scheme with provable security
Computer Standards & Interfaces
Identity-based strong designated verifier signature schemes: Attacks and new construction
Computers and Electrical Engineering
Designated verifier proxy signature scheme without random oracles
Computers & Mathematics with Applications
Improvement of identity-based proxy multi-signature scheme
Journal of Systems and Software
Ring signature scheme for ECC-based anonymous signcryption
Computer Standards & Interfaces
Efficient self-certified proxy CAE scheme and its variants
Journal of Systems and Software
A Modified Anonymous Proxy Signature with a Trusted Party
ETCS '09 Proceedings of the 2009 First International Workshop on Education Technology and Computer Science - Volume 02
An efficient secure proxy verifiably encrypted signature scheme
Journal of Network and Computer Applications
A novel efficient (t,n) threshold proxy signature scheme
Information Sciences: an International Journal
Improvement of a proxy multi-signature scheme without random oracles
Computer Communications
Provably secure multi-proxy signature scheme with revocation in the standard model
Computer Communications
On the security of an identity based multi-proxy signature scheme
Computers and Electrical Engineering
Strongly unforgeable proxy signature scheme secure in the standard model
Journal of Systems and Software
Hi-index | 0.00 |
Recently, several studies about proxy signature schemes have been conducted. In 2009, Yu et al. proposed an anonymous proxy signature scheme attempting to protect the proxy signer's privacy from outsiders. They claimed that their scheme can make the proxy signer anonymous. However, based on our research, we determined that this was not the case and the proxy signer's privacy was not anonymous. Hence, in this paper, we propose a new anonymous proxy signature scheme that truly makes the proxy signer anonymous whilemaking it more secure and efficient when compared with Yu et al.'s scheme. Our proxy signature scheme consists of two contributions. First, we mainly use random numbers and bilinear pairings to attain the anonymous property. Secondly, we increase the security and efficiency of our proxy in the design.