Proxy cryptography potential for current identity management solutions

Summary
Assess. to which extent current IdM systems and solutions can be enhanced with proxy cryptography schemes