Research Article
A Lattice-Based Identity-Based Proxy Blind Signature Scheme in the Standard Model
Table 1
Comparison between schemes [
21,
22] and our scheme.
| Schemes | [21] | [22] | This work |
| The length of public keys | | | | The length of secret keys | | | | The length of signature | | | |
|
|