메뉴 건너뛰기




Volumn 26, Issue 2, 2004, Pages 61-71

Digital signature with message recovery and its variants based on elliptic curve discrete logarithm problem

Author keywords

Authenticated encryption; Cryptography; Digital signature; Message recovery; Self certified public key

Indexed keywords

ALGORITHMS; COMPUTATIONAL COMPLEXITY; CURVE FITTING; PROBLEM SOLVING; PUBLIC KEY CRYPTOGRAPHY;

EID: 0344081218     PISSN: 09205489     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0920-5489(03)00069-2     Document Type: Article
Times cited : (23)

References (26)
  • 2
    • 84947906522 scopus 로고    scopus 로고
    • The exact security of digital signatures: How to sign with rsa and rabin
    • Bellare M., Rogaway P. The exact security of digital signatures: how to sign with rsa and rabin. Advances in Cryptology Eurocrypt '96. 1996;399-416.
    • (1996) Advances in Cryptology Eurocrypt '96 , pp. 399-416
    • Bellare, M.1    Rogaway, P.2
  • 3
    • 0032712929 scopus 로고    scopus 로고
    • Pki, elliptic curve cryptography, and digital signatures
    • Caelli W.J., Dawson E.P., Rea S.A. Pki, elliptic curve cryptography, and digital signatures. Computers & Security. 18(1):1999;47-66.
    • (1999) Computers & Security , vol.18 , Issue.1 , pp. 47-66
    • Caelli, W.J.1    Dawson, E.P.2    Rea, S.A.3
  • 4
    • 0030192262 scopus 로고    scopus 로고
    • Parallel computation of the generating keys for RSA cryptosystems
    • Chang C.-C., Hwang M.-S. Parallel computation of the generating keys for RSA cryptosystems. IEE Electronics Letters. 32(15):1996;1365-1366.
    • (1996) IEE Electronics Letters , vol.32 , Issue.15 , pp. 1365-1366
    • Chang, C.-C.1    Hwang, M.-S.2
  • 5
    • 0033888714 scopus 로고    scopus 로고
    • ElGamal-like digital signature and multisignature schemes using self-certified public keys
    • Feb.
    • Chang Y.-S., Wu T.-C., Huang S.-C. ElGamal-like digital signature and multisignature schemes using self-certified public keys. The Journal of Systems and Software. 50:2000 (Feb.);99-105.
    • (2000) The Journal of Systems and Software , vol.50 , pp. 99-105
    • Chang, Y.-S.1    Wu, T.-C.2    Huang, S.-C.3
  • 7
    • 84874800178 scopus 로고
    • A public-key cryptosystem and a signature scheme based on discrete logarithms
    • July
    • ElGamal T. A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory. IT-31:1985 (July);469-472.
    • (1985) IEEE Transactions on Information Theory , vol.IT-31 , pp. 469-472
    • Elgamal, T.1
  • 9
    • 84934275826 scopus 로고
    • Authenticated encryption schemes with low communication costs
    • Horster P., Michels M., Petersen H. Authenticated encryption schemes with low communication costs. Electronics Letters. 30(15):1994;1212.
    • (1994) Electronics Letters , vol.30 , Issue.15 , pp. 1212
    • Horster, P.1    Michels, M.2    Petersen, H.3
  • 11
    • 0141836511 scopus 로고    scopus 로고
    • Traceability on RSA-based partially signature with low computation
    • Accepted for publication
    • Hwang M.-S., Lee C.-C., Lai Y.-C. Traceability on RSA-based partially signature with low computation. Applied Mathematics and Computation. 2002;. Accepted for publication.
    • (2002) Applied Mathematics and Computation
    • Hwang, M.-S.1    Lee, C.-C.2    Lai, Y.-C.3
  • 13
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • Koblitz K. Elliptic curve cryptosystems. Mathematics of Computation. 48(177):1987;203-209.
    • (1987) Mathematics of Computation , vol.48 , Issue.177 , pp. 203-209
    • Koblitz, K.1
  • 14
    • 0031222768 scopus 로고    scopus 로고
    • Authenticated encryption schemes with linkage between message blocks
    • Lee W.-B., Chang C.-C. Authenticated encryption schemes with linkage between message blocks. Information Processing Letters. 63(5):1997;247-250.
    • (1997) Information Processing Letters , vol.63 , Issue.5 , pp. 247-250
    • Lee, W.-B.1    Chang, C.-C.2
  • 16
    • 85015402934 scopus 로고
    • Use of elliptic curves in cryptography
    • Advances in Cryptology, CRYPTO '85
    • Miller V.S. Use of elliptic curves in cryptography. Advances in Cryptology, CRYPTO '85. Lecture Notes in Computer Science. vol. 218:1985;417-426.
    • (1985) Lecture Notes in Computer Science , vol.218 , pp. 417-426
    • Miller, V.S.1
  • 17
    • 84955571277 scopus 로고    scopus 로고
    • A message recovery signature scheme equivalent to DSA over elliptic curves
    • Miyaji A. A message recovery signature scheme equivalent to DSA over elliptic curves. Advances in Cryptology, ASIACRYPT '96. 1996;1-14.
    • (1996) Advances in Cryptology, ASIACRYPT '96 , pp. 1-14
    • Miyaji, A.1
  • 18
    • 0003629991 scopus 로고
    • Secure hash standard
    • NITS, US Department Commerce, April
    • NITS, Secure hash standard. Tech. Rep. FIPS 180-1, NITS, US Department Commerce, 1995 April.
    • (1995) Tech. Rep. FIPS , vol.180-181
  • 20
    • 0001312077 scopus 로고
    • Message recovery for signature schemes based on the discrete logarithm
    • Nyberg K., Rueppel R.A. Message recovery for signature schemes based on the discrete logarithm. Advances in Cryptology, EUROCRYPT '94. 1994;175-190.
    • (1994) Advances in Cryptology, EUROCRYPT '94 , pp. 175-190
    • Nyberg, K.1    Rueppel, R.A.2
  • 21
    • 0002670834 scopus 로고    scopus 로고
    • Message recovery for signature schemes based on the discrete logarithm
    • Nyberg K., Rueppel R.A. Message recovery for signature schemes based on the discrete logarithm. Designs, Codes and Cryptography. 7(1-2):1996;61-81.
    • (1996) Designs, Codes and Cryptography , vol.7 , Issue.1-2 , pp. 61-81
    • Nyberg, K.1    Rueppel, R.A.2
  • 22
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • Feb.
    • Rivest R.L., Shamir A., Adleman L. A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM. 21:1978 (Feb.);120-126.
    • (1978) Communications of the ACM , vol.21 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 23
    • 0035520955 scopus 로고    scopus 로고
    • Cryptographic system using a self-certified public key based on discrete logarithms
    • Shao Z. Cryptographic system using a self-certified public key based on discrete logarithms. IEE Proceedings - Computer Digital Technology. 148(6):2001;233-237.
    • (2001) IEE Proceedings - Computer Digital Technology , vol.148 , Issue.6 , pp. 233-237
    • Shao, Z.1
  • 24
    • 0036335479 scopus 로고    scopus 로고
    • Authenticated encryption schemes with message linkages for message flows
    • Tseng Y.-M., Jan J.-K., Chien H.-Y. Authenticated encryption schemes with message linkages for message flows. Computers and Electrical Engineering. 29(1):2003;101-109.
    • (2003) Computers and Electrical Engineering , vol.29 , Issue.1 , pp. 101-109
    • Tseng, Y.-M.1    Jan, J.-K.2    Chien, H.-Y.3
  • 25
    • 0037443344 scopus 로고    scopus 로고
    • Digital signature with message recovery using self-certified public keys and its variants
    • Tseng Y.-M., Jan J.-K., Chien H.-Y. Digital signature with message recovery using self-certified public keys and its variants. Applied Mathematics and Computation. 136(2-3):2003;203-214.
    • (2003) Applied Mathematics and Computation , vol.136 , Issue.2-3 , pp. 203-214
    • Tseng, Y.-M.1    Jan, J.-K.2    Chien, H.-Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.