Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
1 2
Pages
|
Viewing 11-17 of 17 total results
New ID-Based Proxy Multi-signature from Pairings ...
However, as yet, to our knowledge, an ID-based proxy multi-signature scheme from bilinear pairings based on inverse computational Diffie-Hellman problem (INV-CDHP) has not been proposed. In this paper, we present the above scheme using advantage of the ‘k-plus’ problem and give a detailed analysis of the same....
 Public Verifiable Identity based Multi-Proxy Multi ...
schemes is multi-proxy multi-signcryption scheme. In 2005, Liu Jun Bao and Xiao Guo Zhen [15] proposed multi-proxy multi-signcryption scheme from pairing.- In this paper we propose public verifiable ID-based multi-proxy multi-signcryption scheme from pairing. In this scheme, only the cooperation of all members in the original...
 Issue 4, Volume 5, 2011 275 Efficient ID-based multi-proxy ...
In [9], Li and Chen has proposed an ID-based multi-proxy multi-signature scheme from bilinear pairings generating a certificate for the proxy signers. To improve the efficiency of multi-proxy multi-signature scheme proposed in [9], in this paper, we have designed an ID-based multi-proxy multi-signature scheme from bilinear pairings. Instead ......
Identity based proxy multi-signature - ScienceDirect
J. Ji, D. Li, M. WangNew proxy multi-signature, multi-proxy signature and multi-proxy multi-signature schemes from bilinear pairings Jisuanji Xuebao/Chinese Journal of Computers, 27 (10) (2004), pp. 1429-1435
 An efficient and secure ID-based multi-proxy multi ...
Asaar et al., in 2014 proposed an ID-based multi-proxy multi-signature (IMPMS) scheme without bilinear pairings [37]. Besides, they showed that the scheme proposed in [20] and [34] are not secure in the underlying security models. However, the scheme
https://eprint.iacr.org/2019/1031.pdf
Average Rating (0 votes)
Bilinear-pairings based designated-verifier multi-proxy ...
Bilinear-pairings based designated-verifier multi-proxy multi-signature scheme ... Based on Cha and Cheon's ID-based signature scheme, a multi-proxy multi-signature scheme based on bilinear-pairs is proposed. The proposed scheme can provide the security properties of proxy protection, verifiability, strong identifiability, strong unforgeability ......
1 2
Pages
|