A Study of Proxy Signature Schemes with Time-Stamp
碩士 === 朝陽科技大學 === 資訊管理系碩士班 === 93 === In current proxy signature schemes, an original signer delegates her/his signing capability to a proxy signer, and then the proxy signer can sign messages on behalf of the original signer. Although these schemes have succeeded in proxy delegations, they share a...
Main Authors: | Cheng-Jian Huang, 黃承健 |
---|---|
Other Authors: | Eric Jui-Lin Lu |
Format: | Others |
Language: | en_US |
Published: |
2005
|
Online Access: | http://ndltd.ncl.edu.tw/handle/x5z37f |
Similar Items
-
Time Bounded Proxy Signature Scheme
by: Huang Kung-Shuan, et al.
Published: (2002) -
An Efficient Certificateless Proxy Signature Scheme
by: Wen-Cheng Ji, et al.
Published: (2010) -
Threshold One-Time Proxy Signature Scheme
by: Chih-Chun Tsai, et al.
Published: (2005) -
Threshold Proxy Signature based on GQ scheme
by: Chung-Yuan Huang, et al.
Published: (2003) -
Identity-based multi-proxy threshold signature scheme
by: Shao-nung Huang, et al.
Published: (2007)