2008 International Conference on Information Technology 2008
DOI: 10.1109/icit.2008.38
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient ID Based Proxy Signature, Proxy Blind Signature and Proxy Partial Blind Signature

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2010
2010
2017
2017

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…These PBS have been used by cryptographers to design several applications like in previous studies . In literature, ID‐based proxy blind signatures came into existence in a previous study by F Zhang et al and since then new developments like in other previous studies took place.…”
Section: Introductionmentioning
confidence: 92%
“…These PBS have been used by cryptographers to design several applications like in previous studies . In literature, ID‐based proxy blind signatures came into existence in a previous study by F Zhang et al and since then new developments like in other previous studies took place.…”
Section: Introductionmentioning
confidence: 92%
“…Their scheme is based on that of Zhang et al [92] and more efficient than that of Dong et al [77] in terms of computational overheads. Subsequently, Majhi et al [93] proposed a new ID-based proxy signature, which is more efficient than that in [94]. They extended this study to design proxy blind and partial proxy blind signature schemes with the assumption that CDHP is hard in the ROM.…”
Section: Remarksmentioning
confidence: 99%
“…The PBS schemes hold both the advantages of proxy signature schemes and of blind signature schemes. Thus far, there are many PBS schemes in the literature, such as discrete logarithm-based schemes [15][16][17][18][19][20][21][22], braid group-based schemes [23], and identity-based (ID-based) PBS [24][25][26][27][28]. PBSs have been found them very useful in hierarchy electronic cash systems [29,27,16].…”
Section: Introductionmentioning
confidence: 99%