Research Article

A Lattice-Based Identity-Based Proxy Blind Signature Scheme in the Standard Model

Table 1

Comparison between schemes [21, 22] and our scheme.

Schemes [21] [22]This work

The length of public keys
The length of secret keys
The length of signature