Login / Signup

Proxy Signature Scheme Based on Isomorphisms of Polynomials.

Shaohua TangLingling Xu
Published in: NSS (2012)
Keyphrases
  • proxy signature scheme
  • forward secure
  • designated verifier
  • security analysis
  • similarity search
  • smart card
  • secret key
  • similarity measure
  • mobile devices
  • standard model