메뉴 건너뛰기




Volumn 14, Issue 12, 2003, Pages 2021-2027

Nonrepudiable threshold proxy signcryption scheme with known proxy agent

Author keywords

Discrete logarithm; Nonrepudiation; Proxy signature; Proxy signcryption; Threshold cryptography

Indexed keywords

CRYPTOGRAPHY; MULTI AGENT SYSTEMS; SECURITY OF DATA; SOFTWARE AGENTS; THEOREM PROVING; THRESHOLD LOGIC;

EID: 1642602935     PISSN: 10009825     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (12)

References (17)
  • 2
    • 84958751721 scopus 로고    scopus 로고
    • Secure mobile agent using strong non-designated proxy signature
    • Varadharajan V. and Mu Y.(ed.), LNCS 2119, Berlin: Springer-Verlag
    • Lee B, Kim H, Kim K. Secure mobile agent using strong non-designated proxy signature. In: Varadharajan V, Mu Y, eds. Proceedings of the ACISP2001. LNCS 2119, Berlin: Springer-Verlag, 2001, 474-486.
    • (2001) Proceedings of the ACISP2001 , pp. 474-486
    • Lee, B.1    Kim, H.2    Kim, K.3
  • 3
    • 1642614187 scopus 로고    scopus 로고
    • Strong proxy signature and its application
    • 11B-1
    • Lee B, Kim H, Kim K. Strong proxy signature and its application. In Proceedings of the SCIS2001. 11B-1, 2001, 603-608.
    • (2001) Proceedings of the SCIS2001 , pp. 603-608
    • Lee, B.1    Kim, H.2    Kim, K.3
  • 6
    • 0032670844 scopus 로고    scopus 로고
    • An efficient nonrepudiable threshold proxy signature scheme with known signers
    • Sun H M. An efficient nonrepudiable threshold proxy signature scheme with known signers. Computer Communications, 1999, 22(8): 717-722.
    • (1999) Computer Communications , vol.22 , Issue.8 , pp. 717-722
    • Sun, H.M.1
  • 7
    • 0141518230 scopus 로고    scopus 로고
    • A secure nonrepudiable threshold proxy signature scheme with known signers
    • Hwang M S, Lin I C, Lu E J L. A secure nonrepudiable threshold proxy signature scheme with known signers. International Journal of Informatica, 2000, 11(2): 1-8.
    • (2000) International Journal of Informatica , vol.11 , Issue.2 , pp. 1-8
    • Hwang, M.S.1    Lin, I.C.2    Lu, E.J.L.3
  • 8
    • 0034313266 scopus 로고    scopus 로고
    • Design of time-stamped proxy signatures with traceable receivers
    • Sun H M. Design of time-stamped proxy signatures with traceable receivers. IEE Proc.-Computers and Digital Techniques, 2000, 147(6): 462-466.
    • (2000) IEE Proc.-Computers and Digital Techniques , vol.147 , Issue.6 , pp. 462-466
    • Sun, H.M.1
  • 9
    • 0035451175 scopus 로고    scopus 로고
    • New nonrepudiable threshold proxy signature scheme with known signers
    • Hsu C L, Wu T S, Wu T C. New nonrepudiable threshold proxy signature scheme with known signers. The Journal of Systems and Software, 2001, 58(2): 119-124.
    • (2001) The Journal of Systems and Software , vol.58 , Issue.2 , pp. 119-124
    • Hsu, C.L.1    Wu, T.S.2    Wu, T.C.3
  • 10
    • 0033875604 scopus 로고    scopus 로고
    • Proxy multi-signature scheme: A new type of proxy signature scheme
    • Yi L J, Bai G Q, Xiao G Z. Proxy multi-signature scheme: A new type of proxy signature scheme. Electronics Letters, 2000, 36(6): 527-528.
    • (2000) Electronics Letters , vol.36 , Issue.6 , pp. 527-528
    • Yi, L.J.1    Bai, G.Q.2    Xiao, G.Z.3
  • 12
    • 0036864802 scopus 로고    scopus 로고
    • Improvement of a threshold proxy signature scheme
    • Chinese source
    • Li J G, Cao Z F. Improvement of a threshold proxy signature scheme. Journal of Computer Research and Development, 2002, 39(11): 1513-1518 (in Chinese with English abstract)
    • (2002) Journal of Computer Research and Development , vol.39 , Issue.11 , pp. 1513-1518
    • Li, J.G.1    Cao, Z.F.2
  • 13
    • 0038358035 scopus 로고    scopus 로고
    • Cryptographic analysis and modification of proxy multi signature scheme
    • Chinese source
    • Li J G, Cao Z F, Zhang Y C, Li J Z. Cryptographic analysis and modification of proxy multi signature scheme. High Technology Letters, 2003, 13(4): 1-5 (in Chinese with English abstract)
    • (2003) High Technology Letters , vol.13 , Issue.4 , pp. 1-5
    • Li, J.G.1    Cao, Z.F.2    Zhang, Y.C.3    Li, J.Z.4
  • 15
    • 20244388769 scopus 로고    scopus 로고
    • An efficient scheme for secure message transmission using proxy-signcryption
    • Edwards J.(ed.), Auckland: Springer-Verlag
    • Gamage C, Leiwo J, Zheng Y. An efficient scheme for secure message transmission using proxy-signcryption. In: Edwards J, ed. Proceedings of the 22th Australasian Computer Science. Auckland: Springer-Verlag, 1999, 420-431.
    • (1999) Proceedings of the 22th Australasian Computer Science , pp. 420-431
    • Gamage, C.1    Leiwo, J.2    Zheng, Y.3
  • 17
    • 85030460443 scopus 로고
    • A threshold cryptosystem without a trusted party
    • Davies D.W.(ed.), LNCS 547, Brighton: Springer-Verlag
    • Pedersen T P. A threshold cryptosystem without a trusted party. In: Davies D W, ed. Proceedings of the Advances in Cryptology-Eurocrypf 91. LNCS 547, Brighton: Springer-Verlag, 1991, 552-526.
    • (1991) Proceedings of the Advances in Cryptology-Eurocrypf 91 , pp. 552-526
    • Pedersen, T.P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.