Namita Tiwari and Sahadeo Padhye Analysis on the generalization of proxy signature Security and Communication Networks 6
In this article, we cover the research progress made on proxy signature and investigate its relationships with other existing signature schemes having continuous progress until now. We also provide real-world scenarios, to understand better the situations, where these schemes are applicable for security purposes. We analyze the security properties of existing schemes and make a comparison among them on the basis of different number theoretic problems. Some open problems are also discussed, to the best of our knowledge.
Complete the form below and we will send an e-mail message containing a link to the selected article on your behalf