
A novel proxy signature scheme based on user hierarchical access control policy
Keywords: Proxy signature; Hierarchical access control; Polynomial interpolation; Security; Discrete logarithm; Hash function