Security Analysis of Some Proxy Signatures

@inproceedings{Wang2003SecurityAO,
  title={Security Analysis of Some Proxy Signatures},
  author={Guilin Wang and Feng Bao and Jianying Zhou and Robert H. Deng},
  booktitle={IACR Cryptology ePrint Archive},
  year={2003}
}
A proxy signature scheme allows an entity to delegate his/her signing capability to another entity in such a way that the latter can sign messages on behalf of the former. Such schemes have been suggested for use in a number of applications, particularly in distributed computing where delegation of rights is quite common. Followed by the first schemes introduced by Mambo, Usuda and Okamoto in 1996, a number of new schemes and improvements have been proposed. In this paper, we present a security… CONTINUE READING
Highly Cited
This paper has 113 citations. REVIEW CITATIONS

From This Paper

Topics from this paper.

Citations

Publications citing this paper.

113 Citations

051015'05'08'11'14'17
Citations per Year
Semantic Scholar estimates that this publication has 113 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 31 references

and Sáez

  • J. Herran
  • Verifiable secret sharing for general access…
  • 2003
Highly Influential
5 Excerpts

proxy signature: Delegation of the power to sign messages

  • M. Mambo, K. Usuda, E. Okamot
  • IEICE Trans. Fundamentals, Sep.
  • 1996
Highly Influential
4 Excerpts

Personal communications

  • J. Herranz
  • August,
  • 2003
1 Excerpt

Similar Papers

Loading similar papers…