Login / Signup
Security Analysis and Improvement of Hsu et al. Threshold Proxy Signature Scheme.
Lifeng Guo
Yang Liu
Published in:
Int. J. Netw. Secur. (2006)
Keyphrases
</>
proxy signature scheme
security analysis
smart card
security requirements
designated verifier
forward secure
public key
authentication protocol
security model
security properties
blind signature scheme
encryption scheme