Security analysis and improvement of some proxy signature schemes
InfoSecu '04 Proceedings of the 3rd international conference on Information security
A security scheme of electronic commerce for mobile agents uses undetachable digital signatures
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Autonomous mobile agent based fair exchange
Computer Networks: The International Journal of Computer and Telecommunications Networking
SCN '08 Proceedings of the 6th international conference on Security and Cryptography for Networks
An efficient anonymous proxy signature scheme with provable security
Computer Standards & Interfaces
Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures
Formal to Practical Security
Autonomous mobile agent based fair exchange
Computer Networks: The International Journal of Computer and Telecommunications Networking
Remarks on the security of the strong proxy signature scheme with proxy signer privacy protection
International Journal of Information and Computer Security
A controllable anonymous proxy signature scheme with revocation
ICIC'10 Proceedings of the Advanced intelligent computing theories and applications, and 6th international conference on Intelligent computing
Cryptanalysis of Li et al.'s proxy signature scheme
CONTROL'05 Proceedings of the 2005 WSEAS international conference on Dynamical systems and control
Improvement of a nominative proxy signature scheme for mobile communication
CONTROL'05 Proceedings of the 2005 WSEAS international conference on Dynamical systems and control
ID-Based proxy signature using bilinear pairings
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
A novel anonymous proxy signature scheme
Advances in Multimedia
Hi-index | 0.00 |
Mambo, et al. [3] discussed the delegation of signature power to a proxy signer. Lee, et al. [5]constructed a strong non-designated proxy signature scheme in which the proxy signer had strong non-repudiation. In this paper, we present an enhancement to their scheme such that the identity of the proxy signer is hidden behind an alias. The identity can be revealed only by the alias authority. We also discuss other applications of this technique.