[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Gu et al., 2008 - Google Patents

An efficient ID-based proxy signature scheme from pairings

Gu et al., 2008

View PDF
Document ID
4853172041445514462
Author
Gu C
Zhu Y
Publication year
Publication venue
Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31-September 5, 2007, Revised Selected Papers 3

External Links

Snippet

This paper proposes a new ID-based proxy signature scheme based on the bilinear pairings. The number of paring operation involved in the verification procedure of our scheme is only one, so our scheme is more efficient comparatively. The new scheme can be …
Continue reading at eprint.iacr.org (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Baek et al. Identity-based threshold decryption
Li et al. Certificate-based signature: security model and efficient construction
Wu et al. A new efficient certificateless signcryption scheme
Chow Removing escrow from identity-based encryption: New security notions and key management techniques
Boneh et al. Chosen-ciphertext security from identity-based encryption
Huang et al. Efficient identity-based signatures and blind signatures
Sun et al. Strongly secure certificateless public key encryption without pairing
Zhu et al. An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices
Seo et al. Efficient certificateless proxy signature scheme with provable security
Chen et al. New ID-based threshold signature scheme from bilinear pairings
Liu et al. Efficient certificate-based encryption in the standard model
Gu et al. An id-based verifiable encrypted signature scheme based on Hess’s scheme
Gu et al. An efficient ID-based proxy signature scheme from pairings
Li et al. Aggregate proxy signature and verifiably encrypted proxy signature
Gu et al. Provable security of ID-based proxy signature schemes
Shao Enhanced certificate-based encryption from pairings
Seo et al. Identity-based universal designated multi-verifiers signature schemes
Zhou et al. Certificate-based generalized ring signcryption scheme
Sun et al. Identity-based on-line/off-line signcryption
Hu et al. An efficient ID-based partially blind signature scheme
Zhang et al. Certificateless signature and blind signature
Zhu et al. An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices
Lu et al. Designing efficient proxy signature schemes for mobile communication
Sun et al. Identity-based directed signature scheme from bilinear pairings
Luo et al. A certificate-based signcryption scheme