Login / Signup
Security Analysis and Improvement of a ($t, n$) Threshold Proxy Signature Scheme.
Fanyu Kong
Jia Yu
Baodong Qin
Ming Li
Daxing Li
Published in:
SNPD (3) (2007)
Keyphrases
</>
proxy signature scheme
security analysis
forward secure
security requirements
designated verifier
smart card
public key
security model
encryption scheme
standard model
signcryption scheme
private key
security properties
proxy signature
software engineering
information security
software systems