Proxy signatures, revisited
- 1 January 1997
- book chapter
- Published by Springer Nature
- p. 223-232
- https://doi.org/10.1007/bfb0028478
Abstract
No abstract availableKeywords
This publication has 10 references indexed in Scilit:
- Proxy-based authorization and accounting for distributed systemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- An analysis of the proxy problem in distributed systemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- A Threshold Cryptosystem without a Trusted PartyPublished by Springer Nature ,2001
- Provably Secure and Practical Identification Schemes and Corresponding Signature SchemesPublished by Springer Nature ,2001
- Distributed Provers with Applications to Undeniable SignaturesPublished by Springer Nature ,2001
- Shared generation of authenticators and signaturesPublished by Springer Nature ,2001
- Proxy signatures for delegating signing operationPublished by Association for Computing Machinery (ACM) ,1996
- Efficient signature generation by smart cardsJournal of Cryptology, 1991
- A public key cryptosystem and a signature scheme based on discrete logarithmsIEEE Transactions on Information Theory, 1985
- How to share a secretCommunications of the ACM, 1979