Sign in

Efficiently Obfuscating Proxy Signature for Protecting Signing Keys on Untrusted Cloud Servers.

Tianyuan LuoYang Shi
Published in: CSCWD (2022)
Keyphrases
  • signature scheme
  • original signer
  • data center
  • proxy signature
  • proxy signature scheme
  • cloud computing
  • third party
  • private key
  • proxy signer
  • secret key
  • database systems
  • access control