2018
DOI: 10.1109/access.2018.2809684
|View full text |Cite
|
Sign up to set email alerts
|

A Short Linearly Homomorphic Proxy Signature Scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
30
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 67 publications
(30 citation statements)
references
References 34 publications
0
30
0
Order By: Relevance
“…Qun et al also proposed a short homomorphic proxy signature scheme. Proxy signature schemes permit an original signer to hand over his/her signing authority to a proxy signer, so that the proxy signer can sign on behalf of the original signer [70].…”
Section: Asymmetric or Public-key Algorithmsmentioning
confidence: 99%
“…Qun et al also proposed a short homomorphic proxy signature scheme. Proxy signature schemes permit an original signer to hand over his/her signing authority to a proxy signer, so that the proxy signer can sign on behalf of the original signer [70].…”
Section: Asymmetric or Public-key Algorithmsmentioning
confidence: 99%
“…( 1 , , 2 , , u, 3 , 4 , e, O , P ). V will execute this algorithm to validate whether the signature tuple satisfies (16). If all the equations mentioned above are true, the signatures are valid.…”
Section: Proposed Idpbs-ntru Schemementioning
confidence: 99%
“…The original signer should authorize an agent to sign for himself. Then a proxy signature (PS) should be used in e-payment system, since proxy signer can satisfy this requirement [16].…”
Section: Introductionmentioning
confidence: 99%
“…At present, doctors use computers to store and retrieve patients' electronic health records (EHRs). EHRs systems replace paper systems and thus increase efficiency in the recording, storage, and retrieval of patients information [5][6][7]. However, EHRs which reveal highly confidential personal information stored in the cloud and exchanged over the Internet can be vulnerable to attack [8][9][10], such as data loss, hackers hijacking information, and integrity.…”
Section: Introductionmentioning
confidence: 99%