Forgery Attack on Two ID-Based Proxy Signature Schemes from Bilinear Pairings.
Chang-Ji WangYuan LiXi-Lei XuPublished in: EIDWT (2013)
Keyphrases
- chosen message
- bilinear pairings
- signature scheme
- proxy signature
- threshold signature scheme
- identity based cryptography
- blind signature scheme
- provably secure
- proxy signature scheme
- blind signature
- signcryption scheme
- public key
- diffie hellman
- standard model
- original signer
- designated verifier
- key management
- partially blind signature scheme
- forward secure
- proxy signer
- public key cryptography
- digital signature
- electronic voting
- ring signature
- key distribution