The property of forward-security can be used to reduce the potential damages caused by key exposure. However, none of the existing proxy signature schemes has taken forward-security into consideration. And most proxy signature schemes are based on discrete logarithm problem. In this paper, we first present a forward-secure proxy signature scheme based on factoring problem. Next, we present a forward-secure threshold proxy signature scheme. © Springer-Verlag 2004.
CITATION STYLE
Chai, Z., & Cao, Z. (2004). Factoring-Based Proxy Signature Schemes with Forward- Security. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3314, 1034–1040. https://doi.org/10.1007/978-3-540-30497-5_159
Mendeley helps you to discover research relevant for your work.