메뉴 건너뛰기




Volumn 2894, Issue , 2003, Pages 507-522

Efficient one-time proxy signatures

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; COMPUTATION THEORY; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; NETWORK SECURITY; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA;

EID: 0345490608     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-40061-5_32     Document Type: Article
Times cited : (38)

References (33)
  • 1
  • 3
    • 0026466320 scopus 로고
    • How to sign given any trapdoor function
    • M. Bellare and S. Micali. How to sign given any trapdoor function. Journal of Cryptology, 39(1992), 214-233.
    • (1992) Journal of Cryptology , vol.39 , pp. 214-233
    • Bellare, M.1    Micali, S.2
  • 4
    • 84978970377 scopus 로고
    • Directed acyclic graphs, one-way functions and digital signatures
    • LNCS
    • D. Bleichenbacher and U. Maurer. Directed acyclic graphs, one-way functions and digital signatures, Advances in Cryptology - Crypto'94, LNCS, 839(1994), 75-82.
    • (1994) Advances in Cryptology - Crypto'94 , vol.839 , pp. 75-82
    • Bleichenbacher, D.1    Maurer, U.2
  • 6
    • 84948125649 scopus 로고    scopus 로고
    • Optimal tree-based one-time digital signature schemes
    • LNCS
    • D. Bleichenbacher and U. Maurer. Optimal tree-based one-time digital signature schemes, STACS'96, LNCS, 1046(1996), 363-374.
    • (1996) STACS'96 , vol.1046 , pp. 363-374
    • Bleichenbacher, D.1    Maurer, U.2
  • 7
    • 84978970262 scopus 로고
    • An efficient existentially unforgeable signature scheme and its applications
    • LNCS
    • C. Dwork and M. Naor. An efficient existentially unforgeable signature scheme and its applications, Advances in Cryptology - Crypto'94, LNCS, 839(1994), 234-246.
    • (1994) Advances in Cryptology - Crypto'94 , vol.839 , pp. 234-246
    • Dwork, C.1    Naor, M.2
  • 10
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transactions on Information Theory. 31(1985), 469-472.
    • (1985) IEEE Transactions on Information Theory , vol.31 , pp. 469-472
    • Elgamal, T.1
  • 11
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • S. Goldwasser, S. Micali and R. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing, 17(1988), 281-308.
    • (1988) SIAM Journal on Computing , vol.17 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 12
    • 84958749510 scopus 로고    scopus 로고
    • The provable security of graph-based one-time signatures and extensions to algebraic signature schemes
    • LNCS
    • A. Hevia and D. Micciancio. The provable security of graph-based one-time signatures and extensions to algebraic signature schemes. Advances in Cryptology - Asiacrypt'02, LNCS, 2501(2002), 379-396.
    • (2002) Advances in Cryptology - Asiacrypt'02 , vol.2501 , pp. 379-396
    • Hevia, A.1    Micciancio, D.2
  • 16
    • 0003605145 scopus 로고
    • Constructing digital signatures from a one way function
    • SRI International
    • L. Lamport. Constructing digital signatures from a one way function. Technical Report CSL-98, SRI International, 1979.
    • (1979) Technical Report CSL-98
    • Lamport, L.1
  • 17
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • L. Lamport. Password authentication with insecure communication. Communication of the ACM, 24(11), 1981, 770-772.
    • (1981) Communication of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 19
    • 0030231965 scopus 로고    scopus 로고
    • Proxy signatures: Delegation of the power to sign messages
    • M. Mambo, K. Usuda and E. Okamoto. Proxy signatures: Delegation of the power to sign messages. IEICE Trans. Fundamentals, Vol. E79-A (1996), 1338-1353.
    • (1996) IEICE Trans. Fundamentals , vol.E79-A , pp. 1338-1353
    • Mambo, M.1    Usuda, K.2    Okamoto, E.3
  • 20
    • 84958802026 scopus 로고
    • A digital signature based on a conventional function
    • LNCS
    • R.C. Merkle. A digital signature based on a conventional function. Advances in Cryptology - Crypto'87, LNCS, 293(1987), 369-378.
    • (1987) Advances in Cryptology - Crypto'87 , vol.293 , pp. 369-378
    • Merkle, R.C.1
  • 29
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • R.L. Rivest, A. Shamir and L. Adleman. A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM, 21(1978), 120-12.
    • (1978) Communications of the ACM , vol.21 , pp. 120-212
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 30
    • 84947431932 scopus 로고    scopus 로고
    • Better than BiBa: Short one -time signatures with fast signing and verifying
    • LNCS
    • L. Reyzin and N. Reyzin. Better than BiBa: Short one -time signatures with fast signing and verifying. Information Security and Privacy (ACISP02), LNCS, 2384(2002), 144-153.
    • (2002) Information Security and Privacy (ACISP02) , vol.2384 , pp. 144-153
    • Reyzin, L.1    Reyzin, N.2
  • 31
    • 0003954249 scopus 로고    scopus 로고
    • PayWord and MicroMint: Two simple micro payment schemes
    • MIT Lab. for Computer Science
    • R. Rivest and A. Shamir. PayWord and MicroMint: two simple micro payment schemes. Tech. Rep., MIT Lab. for Computer Science, 1996.
    • (1996) Tech. Rep.
    • Rivest, R.1    Shamir, A.2
  • 32


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.