Artykuł w czasopiśmie
Brak miniatury
Licencja

ClosedAccessDostęp zamknięty
 

ID-based, proxy, threshold signature scheme

Uproszczony widok
cris.lastimport.scopus2024-02-12T19:45:22Z
dc.abstract.enWe propose the proxy threshold signature scheme with the application of elegant construction of verifiable delegating key in the ID-based infrastructure and also with the bilinear pairings. The protocol satisfies the classical security requirements used in the proxy delegation of signing rights. The description of the system architecture and the possible application of the protocol in edge computing designs is enclosed.
dc.affiliationUniwersytet Warszawski
dc.contributor.authorBłażej, Grela
dc.contributor.authorKułakowski, Henryk
dc.contributor.authorSapiecha, Piotr
dc.contributor.authorPomykała, Jacek
dc.date.accessioned2024-01-25T03:32:17Z
dc.date.available2024-01-25T03:32:17Z
dc.date.issued2021
dc.description.financePublikacja bezkosztowa
dc.description.number2
dc.description.volume67
dc.identifier.doi10.24425/IJET.2021.135965
dc.identifier.issn2081-8491
dc.identifier.urihttps://repozytorium.uw.edu.pl//handle/item/108836
dc.identifier.weblinkhttp://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2021.135965
dc.languageeng
dc.pbn.affiliationmathemathics
dc.relation.ispartofInternational Journal of Electronics and Telecommunications
dc.relation.pages201-205
dc.rightsClosedAccess
dc.sciencecloudnosend
dc.subject.enID-based
dc.subject.enproxy
dc.subject.enthreshold
dc.subject.ensignature
dc.subject.enscheme
dc.titleID-based, proxy, threshold signature scheme
dc.typeJournalArticle
dspace.entity.typePublication