• DocumentCode
    2861935
  • Title

    Proxy Signature Schemes

  • Author

    Lau, B.T.

  • Author_Institution
    Sch. of Inf. Technol. & Multimedia, Swinburne Univ. of Technol.
  • fYear
    2006
  • fDate
    24-26 May 2006
  • Firstpage
    1
  • Lastpage
    6
  • Abstract
    Throughout these years, there are plenty of enhanced proxy signature schemes being developed such as threshold proxy signatures, nominative proxy signatures, one-time proxy signatures, multi-proxy signature, proxy multi-signature and proxy blind signature. Now, proxy signature schemes are applied in various areas like e-commerce, mobile agent, mobile communications, and electronic voting. The paper presents the theoretical research on proxy signature schemes that cover delegation-by-certificate, nominative and threshold proxy signature schemes
  • Keywords
    certification; handwriting recognition; security of data; delegation-by-certificate; e-commerce; electronic voting; mobile agent; mobile communications; multiproxy signature; nominative proxy signatures; one-time proxy signatures; proxy blind signature; proxy multisignature; threshold proxy signature schemes; Electronic commerce; Electronic voting; Handwriting recognition; Information technology; Mobile agents; Mobile communication; Public key; Security;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Industrial Electronics and Applications, 2006 1ST IEEE Conference on
  • Conference_Location
    Singapore
  • Print_ISBN
    0-7803-9513-1
  • Electronic_ISBN
    0-7803-9514-X
  • Type

    conf

  • DOI
    10.1109/ICIEA.2006.257325
  • Filename
    4025926