Login / Signup

A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem.

Min-Shiang HwangEric Jui-Lin LuIuon-Chang Lin
Published in: IEEE Trans. Knowl. Data Eng. (2003)
Keyphrases
  • proxy signature scheme
  • elliptic curve
  • private key
  • proxy signature
  • original signer
  • public key
  • security analysis
  • operating system
  • third party
  • key distribution
  • designated verifier