Cited by 11
A Provably Secure Proxy Signature Scheme in Certificateless Cryptography

Forward Secure Certificateless Proxy Signature Scheme
Jiguo Li, Yanqiong Li, Yichen Zhang
Book:  Lecture Notes in Computer Science (Network and System Security) Volume 7873 (2013), p. 350
Design of ECSEPP: Elliptic Curve Based Secure E-cash Payment Protocol
Aditya Bhattacharyya, S. K. Setua
Book:  Smart Innovation, Systems and Technologies (Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics) Volume 44 (2016), p. 337
A Provably Secure Certificateless Proxy Signature Scheme Against Malicious-But-Passive KGC Attacks
Wenjie Yang, Jian Weng, Xinyi Huang, Anjia Yang
Journal:  The Computer Journal Volume 63, Issue 8 (2020), p. 1139
A short and highly efficient identity‐based designated verifier proxy signature scheme
Xiaoming Hu, Jian Wang, Huajie Xu, Wenan Tan
Journal:  Security and Communication Networks Volume 8, Issue 6 (2015), p. 907
An efficient certificateless proxy signature scheme without pairing
Debiao He, Yitao Chen, Jianhua Chen
Journal:  Mathematical and Computer Modelling Volume 57, Issue 9-10 (2013), p. 2510
Certificateless Proxy Signature from RSA
Lunzhi Deng, Jiwen Zeng, Yunyun Qu
Journal:  Mathematical Problems in Engineering Volume 2014 (2014), p. 1
ECDLP‐based certificateless proxy signature scheme with message recovery
Sahadeo Padhye, Namita Tiwari
Journal:  Transactions on Emerging Telecommunications Technologies Volume 26, Issue 3 (2015), p. 346
On the Security of a Certificateless Proxy Signature Scheme with Message Recovery
Wenbo Shi, Debiao He, Peng Gong
Journal:  Mathematical Problems in Engineering Volume 2013 (2013), p. 1
On the security of pairing-free certificateless digital signature schemes using ECC
Namita Tiwari
Journal:  ICT Express Volume 1, Issue 2 (2015), p. 94
Provably secure certificateless proxy signature scheme in the standard model
Yang Lu, Jiguo Li
Journal:  Theoretical Computer Science Volume 639 (2016), p. 42
Security Analysis of the First Certificateless Proxy Signature Scheme Against Malicious-But-Passive KGC Attacks
Xi-Jun Lin, Qihui Wang, Lin Sun, Zhen Yan, Peishun Liu
Journal:  The Computer Journal Volume 64, Issue 4 (2021), p. 653