搜索结果: 1-6 共查到“军队指挥学 Proxy Signatures”相关记录6条 . 查询时间(0.078 秒)
Privacy-Enhancing Proxy Signatures from Non-Interactive Anonymous Credentials
Proxy signatures anonymous credentials cryptographic protocols
font style='font-size:12px;'>
2016/1/23
Proxy signatures enable an originator to delegate the signing rights for a restricted set of messages to a proxy. The proxy is then able to produce valid signatures only for messages from this deleg...
Identity Based Self Delegated Signature - Self Proxy Signatures
public-key cryptography Identity Based Cryptography Self-Proxy Signatures Delegation Random Oracle Model
font style='font-size:12px;'>
2010/7/14
A proxy signature scheme is a variant of digital signature scheme in which a signer delegates his signing rights to another person called proxy signer, so that the proxy signer can generate the signat...
Anonymous Consecutive Delegation of Signing Rights:Unifying Group and Proxy Signatures
Anonymous Consecutive Delegation Signing Rights Unifying Group Proxy Signatures
font style='font-size:12px;'>
2009/6/2
We define a general model for consecutive delegations of signing rights with the following
properties: The delegatee actually signing and all intermediate delegators remain anonymous.
As for group s...
Security Analysis of Some Proxy Signatures
digital signatures proxy signatures security analysis
font style='font-size:12px;'>
2009/4/10
A proxy signature scheme allows an entity to delegate his/her signing capability
to another entity in such a way that the latter can sign messages on behalf of
the former. Such schemes have been sug...
A Scheme for obtaining a Warrant Message from the Digital Proxy Signatures
Proxy signature Warrant message Message recovery Hash function
font style='font-size:12px;'>
2009/4/8
Mambo et al [6-7] introduced a proxy signature scheme. Neuman [8] extended
the scheme for delegation by warrant, which was further extended by Kim et
al [4] to partial delegation with a warrant. In ...
The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures
Hierarchy of Key Evolving Signatures Characterization Proxy Signatures
font style='font-size:12px;'>
2009/3/24
For the last two decades the notion and implementations of proxy signatures have been used to allow transfer of digital signing power within some context (in order to enable
exibility of signers wit...