Secure proxy signature schemes for delegation of signing rights

A Boldyreva, A Palacio, B Warinschi - Journal of Cryptology, 2012 - Springer
A proxy signature scheme permits an entity to delegate its signing rights to another. These
schemes have been suggested for use in numerous applications, particularly in distributed …

An efficient mobile authentication scheme for wireless networks

C Tang, DO Wu - IEEE Transactions on Wireless …, 2008 - ieeexplore.ieee.org
This paper proposes an efficient authentication scheme, which is suitable for low-power
mobile devices. It uses an elliptic-curve-eryptosystem based trust delegation mechanism to …

Identity-based proxy signature from pairings

W Wu, Y Mu, W Susilo, J Seberry, X Huang - Autonomic and Trusted …, 2007 - Springer
A proxy signature scheme allows an entity to delegate its signing capability to another entity
(proxy) in such a way that the proxy can sign messages on behalf of the delegator. Proxy …

Proxy signatures secure against proxy key exposure

JCN Schuldt, K Matsuura, KG Paterson - International Workshop on Public …, 2008 - Springer
We provide an enhanced security model for proxy signatures that captures a more realistic
set of attacks than previous models of Boldyreva et al. and of Malkin et al.. Our model is …

Proxy signature without random oracles

X Huang, W Susilo, Y Mu, W Wu - Mobile Ad-hoc and Sensor Networks …, 2006 - Springer
Abstract In mobile Ad Hoc networks, the existence and availability of trusted authorities is
severely limited by intrinsic network features, and problems such as “service availability” …

Research on evaluation index and application of rockburst risk in deep strip mining

B Jiang, H Ji, L Fu, S Gu, T Zou, J Lu - Shock and Vibration, 2020 - Wiley Online Library
The practice shows that deep strip mining induces rockburst disaster easily. Accurately
evaluating rockburst risk of the strip coal pillar is of great significance for ensuring the safety …

Designated-verifier proxy signature schemes

G Wang - Security and Privacy in the Age of Ubiquitous …, 2005 - Springer
In a proxy signature scheme, a user delegates his/her signing capability to another user in
such a way that the latter can sign messages on behalf of the former. In this paper, we first …

Mobile privacy in wireless networks-revisited

C Tang, DO Wu - IEEE Transactions on Wireless …, 2008 - ieeexplore.ieee.org
With the widespread use of mobile devices, the privacy of mobile location information
becomes an important issue. In this paper, we present the requirements on protecting …

Designated-verifier proxy signatures for e-commerce

G Wang - 2004 IEEE International Conference on Multimedia …, 2004 - ieeexplore.ieee.org
In a designated-verifier proxy signature scheme, a user delegates her/his signing capability
to another user in such a way that the latter can sign messages on behalf of the former, but …

Aggregate proxy signature and verifiably encrypted proxy signature

J Li, K Kim, F Zhang, X Chen - … 2007, Wollongong, Australia, November 1-2 …, 2007 - Springer
An aggregate signature is a single short string that convinces any verifier that, for all 1≤ i≤
n, signer i signed message mi, where the n signers and n messages are distinct. The main …