메뉴 건너뛰기




Volumn 22, Issue 8, 1999, Pages 717-722

Efficient nonrepudiable threshold proxy signature scheme with known signers

Author keywords

[No Author keywords available]

Indexed keywords

PATTERN RECOGNITION; SECURITY OF DATA;

EID: 0032670844     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0140-3664(99)00029-8     Document Type: Article
Times cited : (139)

References (14)
  • 1
    • 0030231965 scopus 로고    scopus 로고
    • Proxy signatures: Delegation of the power to sign messages
    • Mambo M., Usuda K., Okamoto E. Proxy signatures: delegation of the power to sign messages. IEICE Trans. Fundamentals. E79-A:(9):1996;1338-1354.
    • (1996) IEICE Trans. Fundamentals , vol.79 , Issue.9 , pp. 1338-1354
    • Mambo, M.1    Usuda, K.2    Okamoto, E.3
  • 3
    • 0029752886 scopus 로고    scopus 로고
    • Proposal of an automatic signature scheme using a complier
    • Usuda K., Mambo M., Uyematsu T., Okamoto E. Proposal of an automatic signature scheme using a complier. IEICE Trans. Fundamentals. E79-A:(1):1996;94-101.
    • (1996) IEICE Trans. Fundamentals , vol.79 , Issue.1 , pp. 94-101
    • Usuda, K.1    Mambo, M.2    Uyematsu, T.3    Okamoto, E.4
  • 6
    • 0010567510 scopus 로고    scopus 로고
    • Proxy signatures, revisited. ICICS'97
    • Berlin: Springer. pp. 223-232
    • Kim S., Park S., Won D. Proxy signatures, revisited. ICICS'97. Lecture Notes in Computer Science. 1334:1997;Springer, Berlin. pp. 223-232.
    • (1997) Lecture Notes in Computer Science , vol.1334
    • Kim, S.1    Park, S.2    Won, D.3
  • 7
    • 0000064722 scopus 로고    scopus 로고
    • Threshold proxy signature schemes
    • Japan, September
    • K. Zhang, Threshold proxy signature schemes. 1997 Information Security Workshop, Japan, September, 1997, pp. 191-197.
    • (1997) 1997 Information Security Workshop , pp. 191-197
    • Zhang, K.1
  • 8
    • 84956860632 scopus 로고    scopus 로고
    • On Zhang's nonrepudiable proxy signature schemes' ACISP'98
    • Berlin: Springer. pp. 415-422
    • Lee N.Y., Hwang T., Wang C.H. On Zhang's nonrepudiable proxy signature schemes' ACISP'98. Lecture Notes in Computer Science. 1438:1998;Springer, Berlin. pp. 415-422.
    • (1998) Lecture Notes in Computer Science , vol.1438
    • Lee, N.Y.1    Hwang, T.2    Wang, C.H.3
  • 10
    • 84876222959 scopus 로고
    • Distributed provers with applications to undeniable signatures. Proc. EUROCRYPT'91
    • Berlin: Springer. pp. 221-238
    • Pedersen T. Distributed provers with applications to undeniable signatures. Proc. EUROCRYPT'91. Lecture Notes in Computer Science. 547:1991;Springer, Berlin. pp. 221-238.
    • (1991) Lecture Notes in Computer Science , vol.547
    • Pedersen, T.1
  • 12
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir A. How to share a secret. Commun. of the ACM. 22:(11):1979;612-613.
    • (1979) Commun. of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.