ID-based, Proxy, Threshold Signature Scheme
We propose the proxy threshold signature scheme with the application of elegant construction of verifiable delegating key in the ID-based infrastructure, and also with the bilinear pairings. The protocol satisfies the classical security requirements used in the proxy delegation of signing rights. Th...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Polish Academy of Sciences
2021-05-01
|
Series: | International Journal of Electronics and Telecommunications |
Subjects: | |
Online Access: | https://journals.pan.pl/Content/118886/PDF/29_3222_Pomyka%C5%82a_L_sk_new.pdf |