A Secure Threshold Proxy Signature Scheme.
Feng XuWenhuan ZhouXuan LiuPublished in: Intell. Autom. Soft Comput. (2012)
Keyphrases
- proxy signature scheme
- security analysis
- designated verifier
- forward secure
- signcryption scheme
- standard model
- private key
- security requirements
- proxy signature
- security model
- key management
- key distribution
- public key
- security issues
- smart card
- signature scheme
- encryption scheme
- original signer
- secret sharing
- security properties
- digital signature
- bilinear pairings
- diffie hellman
- group communication
- digital images
- secret key
- lightweight
- distributed systems