Abstract | ||
---|---|---|
Presently, many identity-based proxy signature (IBPS) schemes have been proposed, but most of them are constructed in the random oracle model. Also, the proposed security model for IBPS is not enough complete according to Boldyreva's work. Cao and Cao proposed an IBPS scheme in the standard model. However, their scheme is not secure because of not resisting the attack of delegator and requires mor... |
Year | DOI | Venue |
---|---|---|
2015 | 10.1093/comjnl/bxt132 | The Computer Journal |
Keywords | DocType | Volume |
proxy signature,identity-based cryptography,identity-based proxy signature,security model,efficiency | Journal | 58 |
Issue | ISSN | Citations |
4 | 0010-4620 | 4 |
PageRank | References | Authors |
0.39 | 0 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Ke Gu | 1 | 4 | 0.39 |
Weijia Jia | 2 | 2656 | 221.35 |
Chunlin Jiang | 3 | 4 | 2.08 |