Abstract :
Throughout these years, there are plenty of enhanced proxy signature schemes being developed such as threshold proxy signatures, nominative proxy signatures, one-time proxy signatures, multi-proxy signature, proxy multi-signature and proxy blind signature. Now, proxy signature schemes are applied in various areas like e-commerce, mobile agent, mobile communications, and electronic voting. The paper presents the theoretical research on proxy signature schemes that cover delegation-by-certificate, nominative and threshold proxy signature schemes
Keywords :
certification; handwriting recognition; security of data; delegation-by-certificate; e-commerce; electronic voting; mobile agent; mobile communications; multiproxy signature; nominative proxy signatures; one-time proxy signatures; proxy blind signature; proxy multisignature; threshold proxy signature schemes; Electronic commerce; Electronic voting; Handwriting recognition; Information technology; Mobile agents; Mobile communication; Public key; Security;