Cryptanalysis of Two Proxy Signature Schemes with Restricted Times of Delegation.
Sung-Ming YenJian-Hong WangPublished in: ICISA (2013)
Keyphrases
- signature scheme
- proxy signature
- bilinear pairings
- proxy signature scheme
- original signer
- designated verifier
- standard model
- proxy signer
- threshold signature scheme
- public key
- digital signature scheme
- proxy re encryption
- digital signature
- group signature scheme
- blind signature
- private key
- secret key
- provably secure
- hash functions
- ring signature
- access control
- diffie hellman
- identity based signature
- blind signature scheme
- public key cryptosystem
- conflict resolution
- identity based cryptography