Cryptanalysis and improvement of a proxy signcryption scheme in the standard computational model

A Waheed, AI Umar, M Zareei, N Din, NU Amin… - IEEE …, 2020 - ieeexplore.ieee.org
Proxy signcryption is essential security primitive for emerging secure communication such
as e-business, mobile agents, online voting, contract signing, and online auction. It …

[PDF][PDF] An Efficient Pairing-Free Identity Based Proxy Blind Signature Scheme with Message Recovery.

S James, G Thumbur, PV Reddy - ISeCure, 2021 - sid.ir
In recent years, due to their potential applications, proxy blind signatures became an active
research topic and are an extension of the basic proxy signature. A proxy blind signature …

[PDF][PDF] An efficient proxy signcryption scheme based on the discrete logarithm problem

HM Elkamchouchi, EFA Elkhair… - International Journal of …, 2013 - academia.edu
Signcryption is a cryptographic primitive which simultaneously provides both confidentiality
and authenticity in a single logical step. In a proxy signature scheme, an original signer …

Improved certificateless multi-proxy signature

X Jie, H SUN, Q WEN, H ZHANG - The Journal of China Universities of …, 2012 - Elsevier
Multi-proxy signature is a scheme that an original signer delegates his or her signing
capability to a proxy group. In the scheme, only the cooperation of all proxy signers in the …

[PDF][PDF] An efficient proxy blind signcryption scheme for IoT

A Khan, I Ullah, F Algarni, M Naeem, MI Uddin… - Comput. Mater …, 2022 - academia.edu
Recent years have witnessed growing scientific research interest in the Internet of Things
(IoT) technologies, which supports the development of a variety of applications such as …

[PDF][PDF] New proxy blind signcryption scheme for secure multiple digital messages transmission based on elliptic curve cryptography

PC Su, CH Tsai - KSII Transactions on Internet and Information …, 2017 - koreascience.kr
Having the characteristics of unlinkability, anonymity, and unforgeability, blind signatures
are widely used for privacy-related applications such as electronic cash, electronic voting …

[PDF][PDF] Security analysis and enhanced construction on ECDLP-based proxy blind signature scheme

CH Wang, MZ Liao - International Journal of e-Education, e-Business, e …, 2014 - ijeeee.org
Nowadays, the proxy blind signature is an important issue in E-commerce system. In the
proxy blind signature scheme, the delegation relationship can be established between the …

[PDF][PDF] A message authentication protocol using proxy blind signatures in vehicular ad hoc networks

S Prabhadevi, AM Natarajan - International Journal of Engineering …, 2014 - academia.edu
Nowadays, transportation systems play an important part in our daily activities. One
transportation system that has recently attracted a lot of attention from both academia and …

新型態之電子投票機制設計

蘇品長, 葉昱宗 - 電子商務學報, 2017 - airitilibrary.com
網際網路的普及, 改變了傳統的生活方式與行為模式, 便利的同時也帶出了許多網路安全的課題.
以應用於電子投票為例, 已有許多國家致力於在電子投票發展, 以降低傳統選舉所耗費之社會 …

An improved proxy blind signature scheme based on ECDLP

MK Chande - Malaya Journal of Matematik, 2014 - malayajournal.org
In a proxy blind signature scheme, there is an integration of the properties as well as
advantages of both signature schemes namely proxy signature and blind signature. The …