Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
1 2 3 4 5
Pages
|
Viewing 21-30 of 50 total results
ID-based proxy signature scheme with message recovery ...
For this proxy signing our ID-based proxy signature scheme can be used as it is designed for low communication overhead with provable security feature. 6. Conclusion. In this paper, we have proposed an ID-based proxy signature scheme with message recovery. This scheme needs smaller bandwidth in contrast to previous ID-based proxy signature schemes....
An ID-Based Proxy Multi-Signature Scheme | Scientific.Net
Proxy multi-signature is an extension of the basic proxy signature primitive, and permits two or more entities to delegate their signing capabilities to the same other entity. Combining proxy multi-signature with identity based cryptography, in this paper, We construct a concrete identity based proxy multi-signature scheme by using bilinear pairings....
An Efficient ID- based Directed Signature Scheme from ...
Directed signatures are applicable where the signed message is sensitive to the signature receiver. Due to its merits, directed signature schemes are suitable for applications such as bill of tax and bill of health. In this paper, we proposed efficient identity based directed signature scheme from bilinear pairings....
B.Umaprasada Rao & P.Vasudeva Reddy ID-Based Directed ...
But, when the signed message is sensitive to the signature receiver, it is necessary to combine the concepts of multi-proxy signatures with directed signatures. In this paper, we propose an identity based directed multi-proxy signature scheme using bilinear pairings....
https://core.ac.uk/display/21861015
Average Rating (0 votes)
New ID-Based Proxy Multi-signature from Pairings ...
However, as yet, to our knowledge, an ID-based proxy multi-signature scheme from bilinear pairings based on inverse computational Diffie-Hellman problem (INV-CDHP) has not been proposed. In this paper, we present the above scheme using advantage of the ‘k-plus’ problem and give a detailed analysis of the same....
 Public Verifiable Identity based Multi-Proxy Multi ...
schemes is multi-proxy multi-signcryption scheme. In 2005, Liu Jun Bao and Xiao Guo Zhen [15] proposed multi-proxy multi-signcryption scheme from pairing.- In this paper we propose public verifiable ID-based multi-proxy multi-signcryption scheme from pairing. In this scheme, only the cooperation of all members in the original...
 Issue 4, Volume 5, 2011 275 Efficient ID-based multi-proxy ...
In [9], Li and Chen has proposed an ID-based multi-proxy multi-signature scheme from bilinear pairings generating a certificate for the proxy signers. To improve the efficiency of multi-proxy multi-signature scheme proposed in [9], in this paper, we have designed an ID-based multi-proxy multi-signature scheme from bilinear pairings. Instead ......
Identity based proxy multi-signature - ScienceDirect
J. Ji, D. Li, M. WangNew proxy multi-signature, multi-proxy signature and multi-proxy multi-signature schemes from bilinear pairings Jisuanji Xuebao/Chinese Journal of Computers, 27 (10) (2004), pp. 1429-1435
1 2 3 4 5
Pages
|