Identity-based proxy signature from lattices.
Kee Sung KimDowon HongIk Rae JeongPublished in: J. Commun. Networks (2013)
Keyphrases
- proxy signature
- proxy signature scheme
- signature scheme
- bilinear pairings
- original signer
- proxy signer
- signcryption scheme
- blind signature scheme
- private key
- public key
- blind signature
- forward secure
- standard model
- key management
- provably secure
- designated verifier
- diffie hellman
- digital signature
- security analysis
- security properties
- elliptic curve
- key distribution
- public key cryptography
- secret key