Login / Signup

Proxy Signatures Secure Against Proxy Key Exposure.

Jacob C. N. SchuldtKanta MatsuuraKenneth G. Paterson
Published in: Public Key Cryptography (2008)
Keyphrases
  • trusted third party
  • digital signature
  • neural network
  • signature recognition
  • data sets
  • operating system
  • third party
  • formal model
  • key management
  • key distribution
  • ring signature scheme