Secure Chained Threshold Proxy Signature without and with Supervision.
Zoe Lin JiangSiu-Ming YiuY. DongLucas Chi Kwong HuiStarsky H. Y. WongPublished in: J. Softw. Eng. Appl. (2009)
Keyphrases
- proxy signature scheme
- private key
- proxy signature
- signcryption scheme
- security analysis
- standard model
- designated verifier
- bilinear pairings
- public key
- signature scheme
- blind signature
- key distribution
- secret key
- original signer
- key management
- forward secure
- security requirements
- security issues
- lightweight
- security protocols
- ciphertext
- diffie hellman
- cryptographic protocols
- electronic voting
- provably secure
- end to end