Anonymous Proxy Signature with Hierarchical Traceability
Wei, Jiannan, Yang, Guomin, Mu, Yi and Liang, Kaitai (2015) Anonymous Proxy Signature with Hierarchical Traceability Computer Journal, 59 (4). pp. 559-569.
Full text not available from this repository.Abstract
Anonymous proxy signatures are very useful in the construction of anonymous credential systems such as anonymous voting and anonymous authentication protocols. As a basic requirement, we should ensure an honest proxy signer is anonymous. However, in order to prevent the proxy signer from abusing the signing right, we should also allow dishonest signers to be traced. In this paper, we present three novel anonymous proxy signature schemes with different levels of (namely, public, internal and original signer) traceability. We define the formal definitions and security models for these three different settings, and prove the security of our proposed schemes under some standard assumptions.
Item Type: | Article | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Divisions : | Faculty of Engineering and Physical Sciences > Computing Science | |||||||||||||||
Authors : |
|
|||||||||||||||
Date : | 28 September 2015 | |||||||||||||||
DOI : | 10.1093/comjnl/bxv080 | |||||||||||||||
Copyright Disclaimer : | © The British Computer Society 2015. All rights reserved. For Permissions, please email: journals.permissions@oup.com | |||||||||||||||
Uncontrolled Keywords : | anonymity; privacy; traceability; ring signature; proxy signature | |||||||||||||||
Depositing User : | Jane Hindle | |||||||||||||||
Date Deposited : | 30 Oct 2017 16:05 | |||||||||||||||
Last Modified : | 16 Jan 2019 19:03 | |||||||||||||||
URI: | http://epubs.surrey.ac.uk/id/eprint/844684 |
Actions (login required)
![]() |
View Item |
Downloads
Downloads per month over past year