نتایج جستجو برای: proxy
تعداد نتایج: 25930 فیلتر نتایج به سال:
Proxy blind signature is a combination 0f both the properties of proxy signature and blind signature scheme. This scheme is useful in many applications like e-voting, e-payment and mobile agent environments. This paper presents a new proxy blind signature scheme based on discrete logarithm problem(DLP), which satisfies the secure properties of both the blind signature scheme and the proxy signa...
In 1996, Mambo et al. introduced the proxy signature scheme for digital applications to delegate the signing capability to a proxy signer. Various constructions were made to devise a strong nondesignated proxy signature scheme. In 2002, Shum and Wei proposed an extended scheme to hide the identity of the proxy signer. A Trusted Authority (TA) can reveal the proxy signer’s identity if required. ...
The concept of proxy signature was introduced by Mambo et al. to delegate signing capability in the digital world. In this paper, we show that three existing proxy signature schemes without certificates, namely, the Qian and Cao identity-based proxy signature (IBPS) scheme, the Guo et al. IBPS scheme and the Li et al. certificateless proxy signature (CLPS) scheme are insecure against universal ...
In 1998, Blaze, Bleumer, and Strauss (BBS) proposed proxy re-signatures, in which a semi trusted proxy acts as a translator between Alice and Bob. The proxy resignature schemes can be applied in many applications. However, the existing proxy re-signature schemes were all based on Diffie-Hellman assumption. In this paper, we present a proxy re-signature scheme based on quadratic residues, which ...
The authors propose two multi-proxy signature schemes for partial delegation, in which the original signer can delegate his signing power to a set of proxy signers. One of the proposed schemes is designated on the proxyunprotected approach and the other is on the proxyprotected approach. Both proposed schemes satisfy the basic properties for partial delegation addressed by Mambo, Usuda, and Oka...
A proxy signature scheme allows a proxy signer to sign messages on behalf of an original signer. Proxy signature schemes have found numerous practical applications such as grid computing, mobile agent systems and cloud applications. Recently, Jiang et al. proposed the first lattice-based proxy signature scheme and claimed that their scheme provides all the security properties of a secure proxy ...
BACKGROUND Social care-related quality of life is a key outcome indicator used in the evaluation of social care interventions and policy. It is not, however, always possible to collect quality of life data by self-report even with adaptations for people with cognitive or communication impairments. A new proxy-report version of the Adult Social Care Outcomes Toolkit (ASCOT) measure of social car...
We have designed and validated a rapid, accurate simulation method for evaluating the performance of Web proxy cache replacement algorithm designs. We model the client-proxy-server system by combining a linear model of client-proxy response times with real measurements of proxy-server response times. We experimentally validate the model’s accuracy on the Apache proxy server. Our method should b...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید