Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2013, Article ID 761694, 4 pages
http://dx.doi.org/10.1155/2013/761694
Research Article

On the Security of a Certificateless Proxy Signature Scheme with Message Recovery

1Department of Electronic Engineering, Northeastern University at Qinhuangdao, Qinhuangdao 066004, China
2School of Mathematics and Statistics, Wuhan University, Wuhan, Hubei 430072, China
3National Key Laboratory of Mechatronic Engineering and Control, School of Mechatronical Engineering, Beijing Institute of Technology, Beijing 100081, China

Received 19 January 2013; Accepted 5 April 2013

Academic Editor: Wanquan Liu

Copyright © 2013 Wenbo Shi et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Citations to this Article [4 citations]

The following is the list of published articles that have cited the current article.

  • Wun-She Yap, and Bok-Min Goi, “Forgery attacks of an identity-based multi-proxy signature scheme,” International Journal of Communication Systems, 2014. View at Publisher · View at Google Scholar
  • Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, and Willy Susilo, “A short ID-based proxy signature scheme,” International Journal Of Communication Systems, vol. 29, no. 5, pp. 859–873, 2016. View at Publisher · View at Google Scholar
  • Ali Mahmoodi, Javad Mohajery, and Mahmoud Salmasizadeh, “A certificate-based proxy signature with message recovery without bilinear pairing,” Security and Communication Networks, vol. 9, no. 18, pp. 4983–4991, 2016. View at Publisher · View at Google Scholar
  • Girraj Kumar Verma, B. B. Singh, and Harendra Singh, “Provably Secure Message Recovery Proxy Signature Scheme for Wireless Sensor Networks in e-Healthcare,” Wireless Personal Communications, 2017. View at Publisher · View at Google Scholar