A Batch Verification for Multiple Proxy Signature

In this article, we proposed a batch verification scheme for multiple proxy signatures to reduce the proxy signature verification time. The proposed scheme is not only efficient because it does not...

[1]  Dongho Won,et al.  Proxy signatures, Revisited , 1997, ICICS.

[2]  Cheng-Chi Lee,et al.  Two Simple Batch Verifying Multiple Digital Signatures , 2001, ICICS.

[3]  Jinli Xie,et al.  Effect of Short-Term Synaptic Plasticity on Correlated firing in Feedback Networks , 2011 .

[4]  Qi Xie,et al.  Cryptanalysis of Two Nonrepudiable Threshold Proxy Signature Schemes , 2006, Int. J. Netw. Secur..

[5]  Lein Harn,et al.  Design of generalised ElGamal type digital signature schemes based on discrete logarithm , 1994 .

[6]  M. Mambo,et al.  Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .

[7]  Girraj Kumar Verma A Proxy Blind Signature Scheme over Braid Groups , 2009, Int. J. Netw. Secur..

[8]  Kan Zhang,et al.  Threshold Proxy Signature Schemes , 1997, ISW.

[9]  Eric Jui-Lin Lu,et al.  Abstract , 2003, Appetite.

[10]  Guoqiang Bai,et al.  Proxy multi-signature scheme: a new type of proxy signature scheme , 2000 .

[11]  Kitae Kim,et al.  Remark on Shao et al.'s Bidirectional Proxy Re-signature Scheme in Indocrypt'07 , 2009, Int. J. Netw. Secur..

[12]  Eric Jui-Lin Lu,et al.  Cryptanalysis of the Batch Verifying Multiple DSA-Type Digital Signature , 2001 .

[13]  Min-Shiang Hwang,et al.  A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers , 2000, Informatica.

[14]  Cheng-Chi Lee,et al.  Cryptanalysis and improvement on batch verifying multiple RSA digital signatures , 2006, Appl. Math. Comput..

[15]  Zuo-Wen Tan Improvement on Nominative Proxy Signature Schemes , 2008, Int. J. Netw. Secur..

[16]  L. Harn Batch verifying multiple DSA-type digital signatures , 1998 .

[17]  Min-Shiang Hwang,et al.  Cryptanalysis of the Batch Verifying Multiple RSA Digital Signatures , 2000, Informatica.

[18]  David M'Raïhi,et al.  Can D.S.A. be Improved? Complexity Trade-Offs with the Digital Signature Standard , 1994, EUROCRYPT.

[19]  Zhenfu Cao,et al.  Factoring based proxy signature schemes , 2006 .

[20]  Ashutosh Saxena,et al.  Proxy Signature Scheme with Effective Revocation Using Bilinear Pairings , 2007, Int. J. Netw. Secur..

[21]  Ashutosh Saxena,et al.  C R ] 2 0 D ec 2 00 6 Algorithms and Approaches of Proxy Signature : A Survey MANIK , 2008 .

[22]  Min-Shiang Hwang,et al.  A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification , 2004, Future Gener. Comput. Syst..

[23]  Tzonelih Hwang,et al.  On Zhang's Nonrepudiable Proxy Signature Schemes , 1998, ACISP.

[24]  Chien-Lung Hsu,et al.  New proxy multi-signature scheme , 2005, Appl. Math. Comput..

[25]  Zuhua Shao,et al.  Proxy signature schemes based on factoring , 2003, Inf. Process. Lett..

[26]  Eiji Okamoto,et al.  Proxy signatures for delegating signing operation , 1996, CCS '96.

[27]  Lein Harn,et al.  Batch verifying multiple RSA digital signatures , 1998 .