The security of a strong proxy signature scheme with proxy signer privacy protection.
Narn-Yih LeeMing-Feng LeePublished in: Appl. Math. Comput. (2005)
Keyphrases
- privacy protection
- proxy signature scheme
- original signer
- trusted third party
- proxy signer
- proxy signature
- individual privacy
- security analysis
- statistical databases
- designated verifier
- security properties
- sensitive data
- bilinear pairings
- security requirements
- privacy preserving
- security model
- information loss
- data sharing
- forward secure
- signcryption scheme
- private information
- data collection
- privacy preservation
- sensitive information
- security services
- digital signature
- blind signature scheme
- authentication protocol
- third party
- security mechanisms
- credit card
- data publishing
- intrusion detection
- information security
- access control
- blind signature
- database systems
- encryption scheme
- security protocols
- elliptic curve