DocumentCode
2861935
Title
Proxy Signature Schemes
Author
Lau, B.T.
Author_Institution
Sch. of Inf. Technol. & Multimedia, Swinburne Univ. of Technol.
fYear
2006
fDate
24-26 May 2006
Firstpage
1
Lastpage
6
Abstract
Throughout these years, there are plenty of enhanced proxy signature schemes being developed such as threshold proxy signatures, nominative proxy signatures, one-time proxy signatures, multi-proxy signature, proxy multi-signature and proxy blind signature. Now, proxy signature schemes are applied in various areas like e-commerce, mobile agent, mobile communications, and electronic voting. The paper presents the theoretical research on proxy signature schemes that cover delegation-by-certificate, nominative and threshold proxy signature schemes
Keywords
certification; handwriting recognition; security of data; delegation-by-certificate; e-commerce; electronic voting; mobile agent; mobile communications; multiproxy signature; nominative proxy signatures; one-time proxy signatures; proxy blind signature; proxy multisignature; threshold proxy signature schemes; Electronic commerce; Electronic voting; Handwriting recognition; Information technology; Mobile agents; Mobile communication; Public key; Security;
fLanguage
English
Publisher
ieee
Conference_Titel
Industrial Electronics and Applications, 2006 1ST IEEE Conference on
Conference_Location
Singapore
Print_ISBN
0-7803-9513-1
Electronic_ISBN
0-7803-9514-X
Type
conf
DOI
10.1109/ICIEA.2006.257325
Filename
4025926
Link To Document