Unidirectional Multiple-times Proxy Re-signature Scheme

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Novel Unidirectional Proxy Re-Signature Scheme and Its Application for MANETs

Mobile ad-hoc networks (MANETs) have received a lot of attention recently, adapting proxy re-signature to work in such environments is challenging. In this paper, we propose a novel and efficient proxy re-signature scheme, which provides a flexible and secure way for authorizing the new nodes of mobile ad-hoc networks. The proposed scheme is unidirectional, single-use and non-transitive. Compar...

متن کامل

The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key

In proxy re-signature (PRS), a semi-trusted proxy, with some additional information (a.k.a., re-signature key), can transform Alice’s (delegatee) signature into Bob’s (delegator) signature on the same message, but cannot produce an arbitrary signature on behalf of either the delegatee or the delegator. In this paper, we investigate the security model of proxy re-signature, and find that the pre...

متن کامل

Revisit of Group-based Unidirectional Proxy Re-encryption Scheme

Currently, researchers have focused their attention on proxy re-encryption scheme deployed between two entities. Lots of bidirectional schemes have been proposed and this kind of scheme is suitable for the scenario in which the two entities have already established a relationship of trust. How to construct a unidirectional scheme is an open problem and receiving increasing attention. In this pa...

متن کامل

Efficient Unidirectional Proxy Re-Encryption

Proxy re-encryption (PRE) allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into one encrypting the same plaintext for Bob. The proxy only needs a re-encryption key given by Alice, and cannot learn anything about the plaintext encrypted. This adds flexibility in various applications, such as confidential email, digital right management and distributed storage. In...

متن کامل

Proxy re-signature Scheme Based on Quadratic Residues

In 1998, Blaze, Bleumer, and Strauss (BBS) proposed proxy re-signatures, in which a semi trusted proxy acts as a translator between Alice and Bob. The proxy resignature schemes can be applied in many applications. However, the existing proxy re-signature schemes were all based on Diffie-Hellman assumption. In this paper, we present a proxy re-signature scheme based on quadratic residues, which ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Information Technology Journal

سال: 2013

ISSN: 1812-5638

DOI: 10.3923/itj.2013.4063.4067