Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Proxy signatures for delegating signing operation
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
New nonrepudiable threshold proxy signature scheme with known signers
Journal of Systems and Software
Proxy signature schemes based on factoring
Information Processing Letters
Efficient Identification and Signatures for Smart Cards
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
An efficient nonrepudiable threshold proxy signature scheme with known signers
Computer Communications
Hi-index | 0.00 |
Recently, proxy signature, as a special digital signature, has received a significant attention and has been extensively researched in the cryptographic community. Many excellent proxy signature schemes have been proposed. In this paper, based on conic, we would like to propose a new proxy-protected signature scheme. The proposed scheme is derived from the Schnorr signature, and its security is based on the discrete logarithm problem over conic.