Cryptanalysis of Zhou et al.'s proxy-protected signature schemes.
Je Hong ParkBo Gyeong KangJae Woo HanPublished in: Appl. Math. Comput. (2005)
Keyphrases
- signature scheme
- bilinear pairings
- proxy signature
- blind signature scheme
- proxy signature scheme
- original signer
- designated verifier
- standard model
- public key
- threshold signature scheme
- proxy signer
- blind signature
- digital signature scheme
- forward secure
- digital signature
- partially blind signature scheme
- secret key
- group signature scheme
- diffie hellman
- proxy re encryption
- provably secure
- public key cryptosystem
- ring signature
- trusted third party
- private key
- key distribution
- hash functions
- end to end
- identity based cryptography
- query processing
- identity based signature
- database systems