scispace - formally typeset
Search or ask a question
Topic

Proxy (statistics)

About: Proxy (statistics) is a research topic. Over the lifetime, 5257 publications have been published within this topic receiving 94504 citations. The topic is also known as: proxy variable & proxy measurement.


Papers
More filters
Journal ArticleDOI
TL;DR: The new proxy blind signature scheme based on bilinear pairings is proposed, which can provide unforgeability of e-cash, anonymity of honest customers and efficient traceability of double spending in the electronic cash scheme.
Abstract: In a proxy signature scheme, the proxy signer generates a signature on a message. By the combination of a blind signature with a proxy signature, a proxy blind signature permits the proxy signer produce a blind signature on a message. In this paper, a proxy blind signature scheme based on bilinear pairings is proposed. The proxy blind signature scheme is proved secure upon the discrete logarithm assumptions, decisional bilinear Diffie–Hellman assumptions and Chosen-Target computational Diffie–Hellman assumptions in the Random Oracle Model. In the real world, the customers can withdraw and store money from all levels of the bank. On the basis of the new proxy blind signature, this manuscript proposed an electronic cash (e-cash) scheme. The e-cash scheme can provide unforgeability of e-cash, anonymity of honest customers and efficient traceability of double spending.

22 citations

Patent
Richard Ding Li1
04 Jun 2012
TL;DR: In this article, a method and computer system for selectively using an anonymous proxy is presented, where a user request for content is received and a determination is made as to whether the user request satisfies context criteria.
Abstract: A method and computer system for selectively using an anonymous proxy. A user request for content is received. A determination is made as to whether the user request satisfies context criteria. When the user request satisfies the context criteria, the user request is forwarded to an anonymous proxy. When the user request does not satisfy the context criteria, the request is sent directly to a content provider.

22 citations

Patent
31 Mar 2012
TL;DR: In this article, the first proxy device stores connection information in association with a connection identifier, which is used by the second proxy device to associate the direct connection with stored connection information.
Abstract: Proxy devices associate their direct connection with a client/server connection passing through one or more NAT devices. First proxy device receives a network connection request from a client. First proxy device stores connection information in association with a connection identifier. Connection information may reflect the usage of NAT devices between the two proxy devices. First proxy device sends a connection response including the connection identifier to the client. Second proxy device sends a direct connection request to first proxy device to establish a direct connection. Direct connection request includes the connection identifier, which is used by first proxy device to associate the direct connection with stored connection information. First proxy device may use the connection information to direct network traffic received via this direct connection to the correct destination and to divert network traffic from the server to the client through the direct connection and first and second proxy devices.

22 citations

Journal ArticleDOI
TL;DR: A review of the recent advances on proxy signatures, discusses few notable proposals, analyzes schemes' security and efficiency, and provides an overall remark of these proposals is given in this article.
Abstract: This paper reviews the recent advances on proxy signatures, discusses few notable proposals, analyzes schemes' security and efficiency, and provides an overall remark of these proposals.

22 citations


Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20231,242
20222,473
2021334
2020262
2019250
2018282