Zero-knowledge undeniable signatures (extended abstract)
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
CRYPTO '89 Proceedings on Advances in cryptology
Meta-ElGamal signature schemes
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Convertible Undeniable Signatures
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Designated Confirmer Signatures and Public-Key Encryption are Equivalent
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Proxy signature schemes based on factoring
Information Processing Letters
Repudiation of Cheating and Non-repudiation of Zhang's Proxy Signature Schemes
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
A Digital Nominative Proxy Signature Scheme for Mobile Communication
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
A Secure Agent-Mediated Payment Protocol
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Delegation of Responsibility (Position Paper)
Proceedings of the 6th International Workshop on Security Protocols
On the Difficulty of Key Recovery Systems
ISW '99 Proceedings of the Second International Workshop on Information Security
Extended Proxy Signatures for Smart Cards
ISW '99 Proceedings of the Second International Workshop on Information Security
One-Way Cross-Trees and Their Applications
PKC '02 Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography
Nonrepudiable proxy multi-signature scheme
Journal of Computer Science and Technology
A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem
IEEE Transactions on Knowledge and Data Engineering
An efficient and practical (t, n) threshold proxy signature scheme with known signers
Fundamenta Informaticae
A secure method for signature delegation to mobile agents
Proceedings of the 2004 ACM symposium on Applied computing
On the security of some proxy blind signature schemes
ACSW Frontiers '04 Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 32
A privacy-protecting proxy signature scheme and its application
ACM-SE 42 Proceedings of the 42nd annual Southeast regional conference
Comments on "A Practical (t,n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem'
IEEE Transactions on Knowledge and Data Engineering
A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
Future Generation Computer Systems - Special issue: Computational chemistry and molecular dynamics
Import/export in digital rights management
Proceedings of the 4th ACM workshop on Digital rights management
An intrusion-tolerant authorization and authentication scheme in distributed environments
ACM SIGOPS Operating Systems Review
On the efficiency of nonrepudiable threshold proxy signature scheme with known signers
Journal of Systems and Software
A proxy-protected signature scheme based on conic
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Security analysis and improvement of some proxy signature schemes
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Provably secure delegation-by-certification proxy signature schemes
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Transformation-free proxy cryptosystems and their applications to electronic commerce
InfoSecu '04 Proceedings of the 3rd international conference on Information security
On the security of some proxy blind signature schemes
Journal of Systems and Software
A proxy blind signature schemes based DLP and applying in e-voting
ICEC '05 Proceedings of the 7th international conference on Electronic commerce
Teaching cryptography to undergraduate students in small liberal art schools
InfoSecCD '05 Proceedings of the 2nd annual conference on Information security curriculum development
Factoring based proxy signature schemes
Journal of Computational and Applied Mathematics - Special issue: The international symposium on computing and information (ISCI2004)
Three architectures for trusted data dissemination in edge computing
Data & Knowledge Engineering - Special issue: ER 2004
Sharing and access right delegation for confidential documents: a practical solution
Information and Management
Insider attacks on multi-proxy multi-signature schemes
Computers and Electrical Engineering
Eliptic Curve Based Threshold Proxy Signature Scheme with Known Signers
Fundamenta Informaticae
Proxy-protected signature secure against the undelegated proxy signature attack
Computers and Electrical Engineering
One-time proxy signatures revisited
Computer Standards & Interfaces
Identity based proxy multi-signature
Journal of Systems and Software
Information Sciences: an International Journal
How to construct secure proxy cryptosystem
Information Sciences: an International Journal
Hybrid proxy multisignature: A new type multi-party signature
Information Sciences: an International Journal
Accountability in organisations
International Journal of Information and Computer Security
One-Way Signature Chaining: a new paradigm for group cryptosystems
International Journal of Information and Computer Security
An Efficient ID-Based Proxy Signature Scheme from Pairings
Information Security and Cryptology
An Efficient Strong Key-Insulated Signature Scheme and Its Application
EuroPKI '08 Proceedings of the 5th European PKI workshop on Public Key Infrastructure: Theory and Practice
Efficient Generic Forward-Secure Signatures and Proxy Signatures
EuroPKI '08 Proceedings of the 5th European PKI workshop on Public Key Infrastructure: Theory and Practice
An RSA-Based (t,n) Threshold Proxy Signature Scheme without Any Trusted Combiner
ISC '08 Proceedings of the 11th international conference on Information Security
SCN '08 Proceedings of the 6th international conference on Security and Cryptography for Networks
Cryptanalysis and improvement of a threshold proxy signature scheme
Computer Standards & Interfaces
Traitor tracing with constant size ciphertext
Proceedings of the 15th ACM conference on Computer and communications security
Multi-use unidirectional proxy re-signatures
Proceedings of the 15th ACM conference on Computer and communications security
A privacy problem on Hu-Huang's proxy key generation protocol
Computer Standards & Interfaces
Provably secure proxy-protected signature schemes based on RSA
Computers and Electrical Engineering
Efficient self-certified proxy CAE scheme and its variants
Journal of Systems and Software
Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures
Formal to Practical Security
Analysis on a Non-repudiable Threshold Proxy Signature Scheme with Known Signers
ISNN 2009 Proceedings of the 6th International Symposium on Neural Networks: Advances in Neural Networks - Part II
Efficient Authorization in Delegation Chains with Strong Non-Repudiation
Proceedings of the 2005 conference on Applied Public Key Infrastructure: 4th International Workshop: IWAP 2005
Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of Signatures
Pairing '09 Proceedings of the 3rd International Conference Palo Alto on Pairing-Based Cryptography
An efficient secure proxy verifiably encrypted signature scheme
Journal of Network and Computer Applications
New threshold-proxy threshold-signature schemes
Computers and Electrical Engineering
A novel efficient (t,n) threshold proxy signature scheme
Information Sciences: an International Journal
Efficient and generalized group signatures
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Split-and-delegate: threshold cryptography for the masses
FC'02 Proceedings of the 6th international conference on Financial cryptography
Aggregate proxy signature and verifiably encrypted proxy signature
ProvSec'07 Proceedings of the 1st international conference on Provable security
Certificate issuing using proxy and threshold signatures in self-initialized ad hoc network
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part III
Proxy signatures secure against proxy key exposure
PKC'08 Proceedings of the Practice and theory in public key cryptography, 11th international conference on Public key cryptography
Threshold based group-oriented nominative proxy signature scheme for digital rights management
CCNC'10 Proceedings of the 7th IEEE conference on Consumer communications and networking conference
Efficient proxy signcryption scheme with provable CCA and CMA security
Computers & Mathematics with Applications
Structure-preserving signatures and commitments to group elements
CRYPTO'10 Proceedings of the 30th annual conference on Advances in cryptology
Secure and efficient protocol for vehicular ad hoc network with privacy preservation
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
On the security of an identity based multi-proxy signature scheme
Computers and Electrical Engineering
A traceable certificateless threshold proxy signature scheme from bilinear pairings
APWeb'11 Proceedings of the 13th Asia-Pacific web conference on Web technologies and applications
Quantum Information Processing
Delegatable secret handshake scheme
Journal of Systems and Software
A generic construction for proxy signature scheme
AICI'11 Proceedings of the Third international conference on Artificial intelligence and computational intelligence - Volume Part II
ID-based proxy signature scheme with message recovery
Journal of Systems and Software
A new proxy signcryption scheme using warrants
International Journal of Intelligent Engineering Informatics
Efficient intrusion-resilient signatures without random oracles
Inscrypt'06 Proceedings of the Second SKLOIS conference on Information Security and Cryptology
Factoring-based proxy signature schemes with forward-security
CIS'04 Proceedings of the First international conference on Computational and Information Science
A threshold proxy signature scheme with nonrepudiation and anonymity
ISCIS'06 Proceedings of the 21st international conference on Computer and Information Sciences
An intrusion-resilient authorization and authentication framework for grid computing infrastructure
ICCS'05 Proceedings of the 5th international conference on Computational Science - Volume Part III
A novel ID-Based partial delegation with warrant proxy signature scheme
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
An efficient proxy-protected signature scheme based on factoring
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
ID-Based proxy signature using bilinear pairings
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
Secure delegation-by-warrant ID-based proxy signcryption scheme
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Universal designated-verifier proxy blind signatures for e-commerce
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Improvement of hsu-wu-he’s proxy multi-signature schemes
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
A generalized proxy signature scheme based on the RSA cryptosystem
PDCAT'04 Proceedings of the 5th international conference on Parallel and Distributed Computing: applications and Technologies
Deniable partial proxy signatures
ASIAN'04 Proceedings of the 9th Asian Computing Science conference on Advances in Computer Science: dedicated to Jean-Louis Lassez on the Occasion of His 5th Cycle Birthday
Constructing secure warrant-based proxy signcryption schemes
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
Security analysis of some threshold signature schemes and multi-signature schemes
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
Short designated verifier proxy signature from pairings
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Proxy structured multisignature scheme from bilinear pairings
ISPA'04 Proceedings of the Second international conference on Parallel and Distributed Processing and Applications
A threshold proxy signature scheme using self-certified public keys
ISPA'04 Proceedings of the Second international conference on Parallel and Distributed Processing and Applications
Provable security of ID-Based proxy signature schemes
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
An efficient ID-Based delegation network
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
On the security of some nonrepudiable threshold proxy signature schemes
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
HEAD: hybrid encryption with delegated decryption capability
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
Security weaknesses in two proxy signature schemes
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
Sequential aggregate signatures and multisignatures without random oracles
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
Efficient ID-Based one-time proxy signature and its application in e-cheque
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
Cryptanalysis of some group-oriented proxy signature schemes
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Cryptanalysis of a certificateless multi-proxy signature scheme
ICDCN'12 Proceedings of the 13th international conference on Distributed Computing and Networking
Pairing-based strong designated verifier proxy signature scheme with low cost
Security and Communication Networks
An efficient nonrepudiable threshold proxy signature scheme with known signers
Computer Communications
Eliptic Curve Based Threshold Proxy Signature Scheme with Known Signers
Fundamenta Informaticae
An Efficient and Practical (t, n) Threshold Proxy Signature Scheme with Known Signers
Fundamenta Informaticae
A new proxy signature scheme for a specified group of verifiers
Information Sciences: an International Journal
Proxy signature scheme based on isomorphisms of polynomials
NSS'12 Proceedings of the 6th international conference on Network and System Security
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Secure proxy signature schemes from the Weil pairing
The Journal of Supercomputing
Delegatable pseudorandom functions and applications
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Towards provably secure proxy signature scheme based on Isomorphisms of Polynomials
Future Generation Computer Systems
Software Service Signature (S3) for authentication in cloud computing
Cluster Computing
Hi-index | 0.00 |