Secure proxy signature schemes for delegation of signing rights

A Boldyreva, A Palacio, B Warinschi - Journal of Cryptology, 2012 - Springer
A proxy signature scheme permits an entity to delegate its signing rights to another. These
schemes have been suggested for use in numerous applications, particularly in distributed …

An efficient mobile authentication scheme for wireless networks

C Tang, DO Wu - IEEE Transactions on Wireless …, 2008 - ieeexplore.ieee.org
This paper proposes an efficient authentication scheme, which is suitable for low-power
mobile devices. It uses an elliptic-curve-eryptosystem based trust delegation mechanism to …

Identity-based proxy signature from pairings

W Wu, Y Mu, W Susilo, J Seberry, X Huang - Autonomic and Trusted …, 2007 - Springer
A proxy signature scheme allows an entity to delegate its signing capability to another entity
(proxy) in such a way that the proxy can sign messages on behalf of the delegator. Proxy …

Proxy signatures secure against proxy key exposure

JCN Schuldt, K Matsuura, KG Paterson - … on Practice and Theory in Public …, 2008 - Springer
We provide an enhanced security model for proxy signatures that captures a more realistic
set of attacks than previous models of Boldyreva et al. and of Malkin et al.. Our model is …

Proxy signature without random oracles

X Huang, W Susilo, Y Mu, W Wu - Mobile Ad-hoc and Sensor Networks …, 2006 - Springer
Abstract In mobile Ad Hoc networks, the existence and availability of trusted authorities is
severely limited by intrinsic network features, and problems such as “service availability” …

Mobile privacy in wireless networks-revisited

C Tang, DO Wu - IEEE Transactions on Wireless …, 2008 - ieeexplore.ieee.org
With the widespread use of mobile devices, the privacy of mobile location information
becomes an important issue. In this paper, we present the requirements on protecting …

Designated-verifier proxy signature schemes

G Wang - Security and Privacy in the Age of Ubiquitous …, 2005 - Springer
In a proxy signature scheme, a user delegates his/her signing capability to another user in
such a way that the latter can sign messages on behalf of the former. In this paper, we first …

Designated-verifier proxy signatures for e-commerce

G Wang - 2004 IEEE International Conference on Multimedia …, 2004 - ieeexplore.ieee.org
In a designated-verifier proxy signature scheme, a user delegates her/his signing capability
to another user in such a way that the latter can sign messages on behalf of the former, but …

[HTML][HTML] Designated verifier proxy signature scheme without random oracles

Y Yu, C Xu, X Zhang, Y Liao - Computers & Mathematics with Applications, 2009 - Elsevier
In a designated verifier proxy signature scheme, one can delegate his or her signing
capability to another user in such a way that the latter can sign messages on behalf of the …

Aggregate proxy signature and verifiably encrypted proxy signature

J Li, K Kim, F Zhang, X Chen - … 2007, Wollongong, Australia, November 1-2 …, 2007 - Springer
An aggregate signature is a single short string that convinces any verifier that, for all 1≤ i≤
n, signer i signed message mi, where the n signers and n messages are distinct. The main …