![]() |
Volumn 7, Issue , 2010, Pages
|
ID-based designated -verifier proxy signature scheme without a trusted party
|
Author keywords
ID based; Proxy signature; Untrusting PKG
|
Indexed keywords
DESIGNATED-VERIFIER PROXY SIGNATURES;
FORGERY ATTACKS;
ID-BASED;
PRIVATE KEY;
PRIVATE KEY GENERATORS;
PROXY SIGNATURES;
SECURITY ANALYSIS;
TRUSTED PARTY;
UNTRUSTING PKG;
AUTHENTICATION;
COMPUTER CRIME;
NETWORK SECURITY;
ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS;
|
EID: 78649576172
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/ICCASM.2010.5620475 Document Type: Conference Paper |
Times cited : (5)
|
References (10)
|