Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Reductions among number theoretic problems
Information and Computation
A new signature scheme based on the DSA giving message recovery
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Proxy signatures for delegating signing operation
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
On Zhang's Nonrepudiable Proxy Signature Schemes
ACISP '98 Proceedings of the Third Australasian Conference on Information Security and Privacy
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
A Note on the Complexity of Breaking Okamoto-Tanaka ID-Based Key Exchange Scheme
PKC '98 Proceedings of the First International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Discrete Logarithms and Factoring
Discrete Logarithms and Factoring
Cryptanalysis and improvement of a threshold proxy signature scheme
Computer Standards & Interfaces
Secure Proxy Multi-signature Scheme in the Standard Model
ProvSec '08 Proceedings of the 2nd International Conference on Provable Security
Secure and efficient protocol for vehicular ad hoc network with privacy preservation
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
Strongly unforgeable proxy signature scheme secure in the standard model
Journal of Systems and Software
An identity-based proxy signature scheme from pairings
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Identity based delegation network
Mycrypt'05 Proceedings of the 1st international conference on Progress in Cryptology in Malaysia
A mediated proxy signature scheme with fast revocation for electronic transactions
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
Preventing delegation-based mobile authentications from man-in-the-middle attacks
Computer Standards & Interfaces
Identity-based proxy signature from pairings
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Hi-index | 0.00 |
Proxy signatures, which was proposed by Mambo, Usuda, and Okamoto in 1996, allow a designated person to sign on behalf of an original signer. In this paper, we present a new concept of proxy signature scheme, which can diminish the computational cost and the amount of the memory. This concept is suitable for the application of smart cards, whose processors and memories are rather limited even now. Furthermore, we propose two concrete schemes which are based on the Nyberg-Ruppel scheme and on the RSA scheme, respectively. We also consider the rigorous security of our proposed schemes by using the reduction among functions.