Artykuł w czasopiśmie
Brak miniatury
Licencja

ClosedAccessDostęp zamknięty
 

ID-based, Proxy, Threshold Signature Scheme

Uproszczony widok
dc.abstract.enWe propose the proxy threshold signature scheme with the application of elegant construction of verifiable delegating key in the ID-based infrastructure, and also with the bilinear pairings. The protocol satisfies the classical security requirements used in the proxy delegation of signing rights. The description of the system architecture and the possible application of the protocol in edge computing designs is enclosed.
dc.affiliationUniwersytet Warszawski
dc.contributor.authorSapiecha, Piotr
dc.contributor.authorKułakowski, Henryk
dc.contributor.authorPomykała, Jacek
dc.contributor.authorGrela, Błażej
dc.date.accessioned2024-01-25T03:32:18Z
dc.date.available2024-01-25T03:32:18Z
dc.date.issued2021
dc.description.financePublikacja bezkosztowa
dc.description.number2
dc.description.volume67
dc.identifier.issn2081-8491
dc.identifier.urihttps://repozytorium.uw.edu.pl//handle/item/108837
dc.identifier.weblinkhttps://yadda.icm.edu.pl/baztech/element/bwmeta1.element.baztech-c0296c22-dc66-41db-aaba-19b42dae1e9d
dc.languageeng
dc.pbn.affiliationmathemathics
dc.relation.ispartofInternational Journal of Electronics and Telecommunications
dc.relation.pages201-205
dc.rightsClosedAccess
dc.sciencecloudnosend
dc.titleID-based, Proxy, Threshold Signature Scheme
dc.typeJournalArticle
dspace.entity.typePublication