Identity-Based Blind Proxy Re-Signature Scheme for Data Security.
Xiaodong YangLikun XiaoYutong LiShudong LiJinli WangChunlin ChenPublished in: DSC (2018)
Keyphrases
- data security
- signature scheme
- bilinear pairings
- proxy signature
- proxy signature scheme
- original signer
- access control
- designated verifier
- standard model
- public key
- data centric
- identity based cryptography
- data management
- proxy re encryption
- data privacy
- digital signature
- forward secure
- blind signature scheme
- data integrity
- identity based signature
- information security
- signcryption scheme
- blind signature
- diffie hellman
- private key
- provably secure
- key distribution
- key management
- secret key
- data sets
- databases