ID-based proxy signature scheme with message recovery.
Harendra SinghGirraj Kumar VermaPublished in: J. Syst. Softw. (2012)
Keyphrases
- designated verifier
- proxy signature scheme
- signature scheme
- signcryption scheme
- security model
- standard model
- original signer
- public key
- blind signature
- bilinear pairings
- proxy signature
- provably secure
- key distribution
- digital signature
- blind signature scheme
- ring signature
- encryption scheme
- diffie hellman
- distributed systems