Secure delegation of services through proxy signature with revocation.
Deepnarayan TiwariG. R. GangadharanMaode MaPublished in: Int. J. Trust. Manag. Comput. Commun. (2016)
Keyphrases
- access control
- blind signature
- identity management
- security services
- proxy signature scheme
- public key cryptography
- key management
- bilinear pairings
- private key
- original signer
- public key
- key distribution
- proxy signature
- trusted third party
- electronic voting
- security mechanisms
- web services
- blind signature scheme
- security requirements
- security analysis
- end users
- user privacy
- digital signature
- provably secure
- service providers
- security properties
- group communication
- security model
- signature scheme
- security policies