An efficient secure proxy verifiably encrypted signature scheme.
Jianhong ZhangChenglian LiuYixian YangPublished in: J. Netw. Comput. Appl. (2010)
Keyphrases
- signature scheme
- standard model
- digital signature scheme
- diffie hellman
- bilinear pairings
- digital signature
- proxy signature
- proxy re encryption
- public key
- fair exchange
- identity based signature
- proxy signature scheme
- blind signature
- provably secure
- encryption scheme
- private key
- key distribution
- original signer
- designated verifier
- trusted third party
- public key cryptosystem
- threshold signature scheme
- ciphertext
- blind signature scheme
- cca secure
- secret key
- group signature scheme
- key management
- electronic voting
- ring signature
- encryption key
- chosen message
- hash functions
- public key cryptography
- security analysis
- security model
- identity based cryptography
- query processing
- multi party
- cryptographic protocols
- group communication
- high dimensional