E-mail

E-mail a Wiley Online Library Link

Namita Tiwari and Sahadeo Padhye Analysis on the generalization of proxy signature Security and Communication Networks 6

Article first published online: 27 JUN 2012 | DOI: 10.1002/sec.581

Thumbnail image of graphical abstract

In this article, we cover the research progress made on proxy signature and investigate its relationships with other existing signature schemes having continuous progress until now. We also provide real-world scenarios, to understand better the situations, where these schemes are applicable for security purposes. We analyze the security properties of existing schemes and make a comparison among them on the basis of different number theoretic problems. Some open problems are also discussed, to the best of our knowledge.

Complete the form below and we will send an e-mail message containing a link to the selected article on your behalf

Required = Required Field

Choose captcha format: Image or Audio. Click here if you need help.

SEARCH