Analysis of an ID-based proxy signature scheme without trusted PKG and a proxy blind multi-signature scheme

Limin Sha. Analysis of an ID-based proxy signature scheme without trusted PKG and a proxy blind multi-signature scheme. In 15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2014, Las Vegas, NV, USA, June 30 - July 2, 2014. pages 1-4, IEEE, 2014. [doi]

Abstract

Abstract is missing.