2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) 2015
DOI: 10.1109/iih-msp.2015.90
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Lattice-Based Proxy Signature Scheme without Trapdoor

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 14 publications
0
5
0
Order By: Relevance
“…Notably, this scheme is the first to offer protection for the proxy in the adaptive security model. In 2014, Li et al (2014) put forward a lattice-based proxy Yang et al (2015) proposed a lattice-based proxy signature scheme without a trapdoor, providing a formal security proof of unforgeability in the random oracle model. Since proxy signature can realize secure signature delegation, it has a wide range of application scenarios, such as the signing of certificates in e-commerce, the distribution of e-checks or e-cash, and so on.…”
Section: Proxy Signaturesmentioning
confidence: 99%
“…Notably, this scheme is the first to offer protection for the proxy in the adaptive security model. In 2014, Li et al (2014) put forward a lattice-based proxy Yang et al (2015) proposed a lattice-based proxy signature scheme without a trapdoor, providing a formal security proof of unforgeability in the random oracle model. Since proxy signature can realize secure signature delegation, it has a wide range of application scenarios, such as the signing of certificates in e-commerce, the distribution of e-checks or e-cash, and so on.…”
Section: Proxy Signaturesmentioning
confidence: 99%
“…Therefore, homomorphic signatures are widely used [21]. Proxy signature schemes and identity-based proxy signature schemes based on a lattice have also emerged [22][23][24]. Mao et al [25] proposed the first ABS schemes based on lattices using the preimage sampling technique.…”
Section: Related Workmentioning
confidence: 99%
“…In the specific structure, there are mainly the following categories: lattice cryptography, multivariable cryptography, code-based cryptography, and Hash-based cryptography. Accordingly, some proxy signatures with post quantum security have been proposed, such as [ 5 , 6 , 7 , 8 , 9 ].…”
Section: Introductionmentioning
confidence: 99%