|
计算机应用研究 2011
Efficient identity-based proxy signcryption scheme
|
Abstract:
Proxy signcryption is useful when an original signcrypter needs to delegate his or her signcrypting capability to a signcrypter, and the proxy signcrypt messages on behalf of the original signcrypter. To solve the problem of no forward security and public