Partially Blind Proxy Re-Signature Scheme Without Bilinear Pairing
To address complex bilinear pairing operations and certificate management problems of existing blind proxy re-signature schemes,by using WANG’s scheme for reference,this paper proposes a partially blind proxy re-signature scheme without bilinear pairing based on hard problem of integer factorization...
| Published in: | Jisuanji gongcheng |
|---|---|
| Main Author: | NIU Shufen, LI Wenting, WANG Caifen |
| Format: | Article |
| Language: | English |
| Published: |
Editorial Office of Computer Engineering
2020-05-01
|
| Subjects: | |
| Online Access: | https://www.ecice06.com/fileup/1000-3428/PDF/20200526.pdf |
Similar Items
Partially blind proxy re-signature scheme with proven security
by: Xiaodong YANG, et al.
Published: (2018-02-01)
by: Xiaodong YANG, et al.
Published: (2018-02-01)
Partially blind proxy re-signature scheme with proven security
by: Xiaodong YANG, et al.
Published: (2018-02-01)
by: Xiaodong YANG, et al.
Published: (2018-02-01)
Provably secure certificate less blind proxy re-signatures
by: Tao FENG, et al.
Published: (2012-09-01)
by: Tao FENG, et al.
Published: (2012-09-01)
Provably secure certificate less blind proxy re-signatures
by: Tao FENG, et al.
Published: (2012-09-01)
by: Tao FENG, et al.
Published: (2012-09-01)
Proxy Re-signature Schemes : Multi-use, Unidirectional & Translations
by: N.R. Sunitha, et al.
Published: (2011-08-01)
by: N.R. Sunitha, et al.
Published: (2011-08-01)
Two Quantum Proxy Blind Signature Schemes Based on Controlled Quantum Teleportation
by: Qiming Luo, et al.
Published: (2022-10-01)
by: Qiming Luo, et al.
Published: (2022-10-01)
Blockchain-enhanced certificateless signature scheme in the standard model
by: Xiaodong Yang, et al.
Published: (2023-05-01)
by: Xiaodong Yang, et al.
Published: (2023-05-01)
Post-Quantum Secure Identity-Based Proxy Blind Signature Scheme on a Lattice
by: Fengyin Li, et al.
Published: (2023-08-01)
by: Fengyin Li, et al.
Published: (2023-08-01)
ID-based, Proxy, Threshold Signature Scheme
by: Jacek Pomykała, et al.
Published: (2021-05-01)
by: Jacek Pomykała, et al.
Published: (2021-05-01)
Secure E-Voting Protocol Based on SM9 Blind Signature and Ring Signature
by: RAO Jintao, CUI Zhe
Published: (2023-06-01)
by: RAO Jintao, CUI Zhe
Published: (2023-06-01)
Design and implementation of proxy-protected proxy signature based on SM2
by: Qing-xiao GUO, et al.
Published: (2017-09-01)
by: Qing-xiao GUO, et al.
Published: (2017-09-01)
Design and implementation of proxy-protected proxy signature based on SM2
by: Qing-xiao GUO,Da-wei ZHANG,Jing-wen SONG, et al.
Published: (2017-09-01)
by: Qing-xiao GUO,Da-wei ZHANG,Jing-wen SONG, et al.
Published: (2017-09-01)
Group–Proxy Signature Scheme: A Novel Solution to Electronic Cash
by: Bao Haiyong, et al.
Published: (2013-06-01)
by: Bao Haiyong, et al.
Published: (2013-06-01)
An Algorithm of (n, t)-Threshold Proxy Signature with an Arbitrator
by: E. A. Tolyupa
Published: (2013-08-01)
by: E. A. Tolyupa
Published: (2013-08-01)
Provably secure partially blind signature without trusted PKG
by: FENG Tao1, et al.
Published: (2010-01-01)
by: FENG Tao1, et al.
Published: (2010-01-01)
Provably secure partially blind signature without trusted PKG
by: FENG Tao1, et al.
Published: (2010-01-01)
by: FENG Tao1, et al.
Published: (2010-01-01)
Blind signature scheme based on trusted platform computation module
by: Wen-ting HUANG, et al.
Published: (2013-08-01)
by: Wen-ting HUANG, et al.
Published: (2013-08-01)
Blind signature scheme based on trusted platform computation module
by: Wen-ting HUANG, et al.
Published: (2013-08-01)
by: Wen-ting HUANG, et al.
Published: (2013-08-01)
Adaptor signature scheme based on ISRSAC digital signature algorithm
by: Yanshuo ZHANG, et al.
Published: (2023-03-01)
by: Yanshuo ZHANG, et al.
Published: (2023-03-01)
Adaptor signature scheme based on ISRSAC digital signature algorithm
by: Yanshuo ZHANG, et al.
Published: (2023-03-01)
by: Yanshuo ZHANG, et al.
Published: (2023-03-01)
ID-based signature without trusted PKG
by: ZHOU Liang1, et al.
Published: (2008-01-01)
by: ZHOU Liang1, et al.
Published: (2008-01-01)
ID-based signature without trusted PKG
by: ZHOU Liang1, et al.
Published: (2008-01-01)
by: ZHOU Liang1, et al.
Published: (2008-01-01)
On the Classification of Proxy Digital Signature Schemes
by: A. A. Varfolomeev
Published: (2010-03-01)
by: A. A. Varfolomeev
Published: (2010-03-01)
Identity-based key-insulated aggregate signature scheme
by: P. Vasudeva Reddy, et al.
Published: (2017-07-01)
by: P. Vasudeva Reddy, et al.
Published: (2017-07-01)
Certificateless signature scheme without bilinear pairings
by: Sheng-bao WANG, et al.
Published: (2012-04-01)
by: Sheng-bao WANG, et al.
Published: (2012-04-01)
Certificateless signature scheme without bilinear pairings
by: Sheng-bao WANG, et al.
Published: (2012-04-01)
by: Sheng-bao WANG, et al.
Published: (2012-04-01)
Revocable identity-based proxy re-signature scheme in the standard model
by: Xiaodong YANG, et al.
Published: (2019-05-01)
by: Xiaodong YANG, et al.
Published: (2019-05-01)
Revocable identity-based proxy re-signature scheme in the standard model
by: Xiaodong YANG, et al.
Published: (2019-05-01)
by: Xiaodong YANG, et al.
Published: (2019-05-01)
Evaluation of Computationally Efficient Identity-Based Proxy Signatures
by: Saddam Hussain, et al.
Published: (2025-01-01)
by: Saddam Hussain, et al.
Published: (2025-01-01)
Proxy re-signature scheme based on isomorphisms of polynomial
by: Hui-xian LI, et al.
Published: (2017-02-01)
by: Hui-xian LI, et al.
Published: (2017-02-01)
Proxy re-signature scheme based on isomorphisms of polynomial
by: Hui-xian LI, et al.
Published: (2017-02-01)
by: Hui-xian LI, et al.
Published: (2017-02-01)
Method of Anti-Virus Protection Based on (n, t) Threshold Proxy Signature with an Arbitrator
by: E. A. Tolyupa
Published: (2014-04-01)
by: E. A. Tolyupa
Published: (2014-04-01)
Partial blind signature scheme based on SM9 algorithm
by: Yao LYU, et al.
Published: (2021-08-01)
by: Yao LYU, et al.
Published: (2021-08-01)
Blind Proxy Re-Signature Scheme Based on Isomorphisms of Polynomials
by: Li Huixian, et al.
Published: (2018-01-01)
by: Li Huixian, et al.
Published: (2018-01-01)
Attribute-Based Verifiable Conditional Proxy Re-Encryption Scheme
by: Yongli Tang, et al.
Published: (2023-05-01)
by: Yongli Tang, et al.
Published: (2023-05-01)
An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks
by: Hongfei Zhu, et al.
Published: (2018-05-01)
by: Hongfei Zhu, et al.
Published: (2018-05-01)
Lattice based signatures with additional functionalities
by: Swati Rawal, et al.
Published: (2025-06-01)
by: Swati Rawal, et al.
Published: (2025-06-01)
Forward secure proxy signature scheme
by: WANG Xiao-ming, et al.
Published: (2005-01-01)
by: WANG Xiao-ming, et al.
Published: (2005-01-01)
Forward secure proxy signature scheme
by: WANG Xiao-ming, et al.
Published: (2005-01-01)
by: WANG Xiao-ming, et al.
Published: (2005-01-01)
Cryptanalysis and design of signature schemes with identity ambiguity in the standard model
by: ZHANG Ming-wu1, et al.
Published: (2011-01-01)
by: ZHANG Ming-wu1, et al.
Published: (2011-01-01)
Similar Items
-
Partially blind proxy re-signature scheme with proven security
by: Xiaodong YANG, et al.
Published: (2018-02-01) -
Partially blind proxy re-signature scheme with proven security
by: Xiaodong YANG, et al.
Published: (2018-02-01) -
Provably secure certificate less blind proxy re-signatures
by: Tao FENG, et al.
Published: (2012-09-01) -
Provably secure certificate less blind proxy re-signatures
by: Tao FENG, et al.
Published: (2012-09-01) -
Proxy Re-signature Schemes : Multi-use, Unidirectional & Translations
by: N.R. Sunitha, et al.
Published: (2011-08-01)
