메뉴 건너뛰기




Volumn 15, Issue 6, 2003, Pages 1552-1560

A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem

Author keywords

Lagrange interpolating polynomial; RSA cryptosystem; Threshold proxy signature

Indexed keywords

BANDWIDTH; COMPUTER SOFTWARE; CRYPTOGRAPHY; DATABASE SYSTEMS; DECISION MAKING; ELECTRONIC COMMERCE; INFORMATION RETRIEVAL; INTERPOLATION; LAGRANGE MULTIPLIERS; MOBILE COMPUTING; POLYNOMIALS; SECURITY OF DATA;

EID: 0242410360     PISSN: 10414347     EISSN: None     Source Type: Journal    
DOI: 10.1109/TKDE.2003.1245292     Document Type: Article
Times cited : (93)

References (26)
  • 8
    • 84874800178 scopus 로고
    • A Public-Key CryptoSystem and a Signature Scheme Based on Discrete Logarithms
    • T. ElGamal, "A Public-Key CryptoSystem and a Signature Scheme Based on Discrete Logarithms," IEEE Trans. Information Theory, vol. 31, no. 4, pp. 469-472, 1985.
    • (1985) IEEE Trans. Information Theory , vol.31 , Issue.4 , pp. 469-472
    • Elgamal, T.1
  • 10
    • 0034314397 scopus 로고    scopus 로고
    • An Efficient Threshold Decryption Scheme without Session Keys
    • M.S. Hwang, C.C. Chang, and K.F. Hwang, "An Efficient Threshold Decryption Scheme without Session Keys," Computers & Electrical Eng., vol. 27, no. 1, pp. 29-35, 2000.
    • (2000) Computers & Electrical Eng. , vol.27 , Issue.1 , pp. 29-35
    • Hwang, M.S.1    Chang, C.C.2    Hwang, K.F.3
  • 11
    • 0036509730 scopus 로고    scopus 로고
    • An ElGamal-Like Cryptosystem for Enciphering Large Messages
    • M.S. Hwang, C.C. Chang, and K.F. Hwang, "An ElGamal-Like Cryptosystem for Enciphering Large Messages," IEEE Trans. Knowledge and Data Eng., vol. 14, no. 2, pp. 445-446, 2002.
    • (2002) IEEE Trans. Knowledge and Data Eng. , vol.14 , Issue.2 , pp. 445-446
    • Hwang, M.S.1    Chang, C.C.2    Hwang, K.F.3
  • 12
    • 0141518230 scopus 로고    scopus 로고
    • A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers
    • M.S. Hwang, I.C. Lin, and E.J.L. Lu, "A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers," Int'l J. Information, vol. 11, no. 2, pp. 1-8, 2000.
    • (2000) Int'l J. Information , vol.11 , Issue.2 , pp. 1-8
    • Hwang, M.S.1    Lin, I.C.2    Lu, E.J.L.3
  • 16
    • 0030231965 scopus 로고    scopus 로고
    • Proxy Signatures: Delegation of the Power to Sign Message
    • M. Mambo, K. Usuda, and E. Okamoto, "Proxy Signatures: Delegation of the Power to Sign Message," IEICE Trans. Fundamentals, vol. E79-A, no. 9, pp. 1338-1354, 1996.
    • (1996) IEICE Trans. Fundamentals , vol.E79-A , Issue.9 , pp. 1338-1354
    • Mambo, M.1    Usuda, K.2    Okamoto, E.3
  • 18
    • 0027316628 scopus 로고
    • Proxy-Based Authorization and Accounting for Distributed Systems
    • B.C. Neuman, "Proxy-Based Authorization and Accounting for Distributed Systems," Proc. 13th Int'l Conf. Distributed Systems, pp. 283-291, 1993.
    • (1993) Proc. 13th Int'l Conf. Distributed Systems , pp. 283-291
    • Neuman, B.C.1
  • 19
    • 0034264732 scopus 로고    scopus 로고
    • Mobile Agent for World Wide Web Distributed Database Access
    • S. Papastavrou, G. Samaras, and E. Pitoura, "Mobile Agent for World Wide Web Distributed Database Access," IEEE Trans. Knowledge and Data Eng., vol. 12, no. 5, pp. 802-820, 2000.
    • (2000) IEEE Trans. Knowledge and Data Eng. , vol.12 , Issue.5 , pp. 802-820
    • Papastavrou, S.1    Samaras, G.2    Pitoura, E.3
  • 20
    • 84876222959 scopus 로고
    • Distributed Provers with Applications to Undeniable Signatures
    • T. Pedersen, "Distributed Provers with Applications to Undeniable Signatures," Proc. Advance in Cryptology (Eurocrypt '91), pp. 221-238, 1991.
    • (1991) Proc. Advance in Cryptology (Eurocrypt '91) , pp. 221-238
    • Pedersen, T.1
  • 21
    • 85030460443 scopus 로고
    • A Threshold Cryptosystem without a Trusted Party
    • T.P. Pedersen, "A Threshold Cryptosystem without a Trusted Party," Proc. Eurocrypt '91, pp. 522-526, 1991.
    • (1991) Proc. Eurocrypt '91 , pp. 522-526
    • Pedersen, T.P.1
  • 22
    • 0017930809 scopus 로고
    • A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
    • Feb
    • R.L. Rivest, A. Shamir, and L.M. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Comm. ACM, vol. 21, pp. 120-126, Feb. 1978.
    • (1978) Comm. ACM , vol.21 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 23
    • 0032670844 scopus 로고    scopus 로고
    • An Efficient Nonrepudiable Threshold Proxy Signature Scheme with Known Signers
    • H.-M. Sun, "An Efficient Nonrepudiable Threshold Proxy Signature Scheme with Known Signers," Computer Comm., vol. 22, no. 8, pp. 717-722, 1999.
    • (1999) Computer Comm. , vol.22 , Issue.8 , pp. 717-722
    • Sun, H.-M.1
  • 24
    • 0029752886 scopus 로고    scopus 로고
    • Proposal of an Automatic Signature Scheme Using a Compiler
    • K. Usuda, M. Mambo, T. Uyematsu, and E. Okamoto, "Proposal of an Automatic Signature Scheme Using a Compiler," IEICE Trans. fundamentals, vol. E79-A, no. 1, pp. 94-101, 1996.
    • (1996) IEICE Trans. Fundamentals , vol.E79-A , Issue.1 , pp. 94-101
    • Usuda, K.1    Mambo, M.2    Uyematsu, T.3    Okamoto, E.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.