A new identification scheme based on syndrome decoding
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
A security architecture for computational grids
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
How to Achieve a McEliece-Based Digital Signature Scheme
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Disallowing Unauthorized State Changes of Distributed Shared Objects
Proceedings of the IFIP TC11 Fifteenth Annual Working Conference on Information Security for Global Information Infrastructures
A Law-Abiding Peer-to-Peer Network for Free-Software Distribution
NCA '01 Proceedings of the IEEE International Symposium on Network Computing and Applications (NCA'01)
A secure identity-based proxy multi-signature scheme
Information Sciences: an International Journal
An efficient anonymous proxy signature scheme with provable security
Computer Standards & Interfaces
A New Efficient Threshold Ring Signature Scheme Based on Coding Theory
PQCrypto '08 Proceedings of the 2nd International Workshop on Post-Quantum Cryptography
A secure identity-based multi-proxy signature scheme
Computers and Electrical Engineering
Identity-based strong designated verifier signature schemes: Attacks and new construction
Computers and Electrical Engineering
A novel identity-based strong designated verifier signature scheme
Journal of Systems and Software
Hidden attribute-based signatures without anonymity revocation
Information Sciences: an International Journal
An analysis of proxy signatures: is a secure channel necessary?
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Fuzzy keyword search over encrypted data in cloud computing
INFOCOM'10 Proceedings of the 29th conference on Information communications
New directions in cryptography
IEEE Transactions on Information Theory
Hi-index | 0.00 |
In multiple grade proxy signatures, the signing right can be delegated from one grade to the next grade. In this paper, we first introduce a code-based multiple grade proxy signatures based on Stern's identification scheme. The proposed scheme is the first code-based multiple grade proxy signature. Our scheme is secure on the syndrome decoding problem and satisfies verifiability, unforgeability, undeniability, non-transferability and distinguishability properties, which are the security requirements for a multiple grade proxy signature.