Proxy-protected signature secure against the undelegated proxy signature attack.
Yu-Chuan LiuHsiang-An WenChun-Li LinTzonelih HwangPublished in: Comput. Electr. Eng. (2007)
Keyphrases
- proxy signature
- private key
- secret key
- proxy signature scheme
- ciphertext
- proxy signer
- original signer
- signature scheme
- public key
- blind signature
- key distribution
- security properties
- diffie hellman
- authentication protocol
- digital signature
- standard model
- encryption scheme
- bilinear pairings
- secure communication
- blind signature scheme
- smart card
- designated verifier
- security analysis
- sensitive data
- trusted third party
- key management
- provably secure
- security requirements
- electronic voting
- public key cryptography
- elliptic curve
- ring signature
- forward secure
- secret sharing scheme
- hash functions
- formal model