A Modified (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem.
Wen-Chung KuoMing-Yang ChenPublished in: ICITA (2) (2005)
Keyphrases
- proxy signature scheme
- private key
- proxy signature
- elliptic curve
- public key
- original signer
- signature scheme
- signcryption scheme
- designated verifier
- security analysis
- key distribution
- digital signature
- secret key
- forward secure
- ciphertext
- key management
- public key cryptography
- diffie hellman
- bilinear pairings
- secret sharing scheme
- security model
- encryption scheme
- standard model