Login / Signup

Improvement of threshold proxy signature scheme.

Zuhua Shao
Published in: Comput. Stand. Interfaces (2004)
Keyphrases
  • proxy signature scheme
  • designated verifier
  • forward secure
  • security analysis
  • signcryption scheme
  • information systems