Login / Signup
Comparison of Threshold Proxy Signature Schemes.
Harsh Kumar Verma
Kamalpreet Kaur
Raman Kumar
Published in:
Security and Management (2008)
Keyphrases
</>
signature scheme
proxy signature scheme
standard model
proxy signature
original signer
proxy re encryption
digital signature scheme
threshold signature scheme
designated verifier
bilinear pairings
blind signature
proxy signer
public key
blind signature scheme
provably secure
hash functions
response time