نتایج جستجو برای: proxy
تعداد نتایج: 25930 فیلتر نتایج به سال:
rant as a part information of verification. Furthermore, in terms of proxy delegation steps, some proxy signature schemes are non-interactive [46] and some schemes [7] are interactive. No matter what kind of proxy signature Recently, Shum and Wei proposed an enhancement to the Lee et Proxy signature such that the schemes, a proxy scheme provide good proxy signer's identity is hidden behind an a...
A proxy signature scheme allows an entity to delegate its signing capability to another entity (proxy) in such a way that the proxy can sign messages on behalf of the delegator. Proxy signatures have found numerous practical applications such as distributed systems, mobile agent applications, etc. Recently, Xu, Zhang and Feng proposed the first formal models of identity based proxy signature. U...
Previous proxy signature schemes enable a principal to have a trusted proxy agent sign messages on its behalf. We present a proxy signature scheme that combines the functionality of proxy signing and en-cryption. This proxy-signcryption scheme is useful for applications that are based on unreliable datagram style network communication model where messages are individually signed and not seriall...
In a proxy signature scheme, a potential signer delegates his capabilities to a proxy signer, who can sign documents on behalf of him. The recipient of the signature verifies both identities: that of the delegator and that of the proxy signer. There are many proposals of proxy signature schemes, but security of them has not been considered in a formal way until the appearance of [2, 8]. If the ...
Previous proxy signature schemes enable a principal to have a trusted proxy agent sign messages on its behalf We present a proxy signature scheme that combines the functionality of proxy signing and en cryption This proxy signcryption scheme is useful for applications that are based on unreliable datagram style network communication model where messages are individually signed and not serially ...
In this article, we proposed a batch verification scheme for multiple proxy signatures to reduce the proxy signature verification time. The proposed scheme is not only efficient because it does not verify each individual proxy signature separately, but also secure because it can detect forged multiple proxy signatures without failure.
This paper presents a new identity based strong designated verifier parallel multiproxy signature scheme. Multi-Proxy signatures allow the original signer to delegate his signing power to a group of proxy signers. In our scheme, the designated verifier can only validate proxy signatures created by a group of proxy signer.
Proxy-based multicast is an approach to implementing the multicast function with proxy servers, which has many advantages compared to the IP multicast. When proxy locations are predetermined, many routing algorithms can be used to build a multicast overlay network. On the other hand, the problem of where to place proxies has not been extensively studied yet. A study on the placement problem for...
OBJECTIVES Patients with cognitive impairment may have difficulty reporting their functional and cognitive abilities, which are important clinical outcomes. Health care proxies may be able to corroborate patient self-reports. Several studies reported discrepancy between patient and proxy ratings, though the literature is sparse on changes over time of these ratings. Our goals in this 12-month s...
Proxy signcrytipn scheme allows an original signer to delegate his signing power to a proxy such that the latter can signcrypt a message on behalf of the former. Recently, Lin et al. proposed a proxy signcryption with CCA and CMA security. In this work, we indicate that the Lin et al.’s proxy signcryption scheme does not hold the security of indistinguishability against adaptive chosen-cipherte...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید