-
3
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
April
-
S. Goldwasser, S. Micali, and R. Rivest, "A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks," SIAM Journal of Computing, vol.17, no. 2, pp. 281-308, April 1988.
-
(1988)
SIAM Journal of Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
4
-
-
0242410360
-
A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem
-
M.-S. Hwang, E. J.-L. Lu, and I.-C. Lin, "A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem," IEEE Trans. Knowledge and Data Engineering, vol. 15, no. 6, pp. 1552-1560, 2003.
-
(2003)
IEEE Trans. Knowledge and Data Engineering
, vol.15
, Issue.6
, pp. 1552-1560
-
-
Hwang, M.-S.1
Lu, E.J.-L.2
Lin, I.-C.3
-
5
-
-
0010567510
-
Proxy signatures, revisited
-
LNCS 1334, Springer-Verlag
-
S. Kim, S. Park, and D. Won, "Proxy Signatures, Revisited," Proc. Information and Communications Security (ICICS'97), LNCS 1334, Springer-Verlag, pp. 223-232, 1997.
-
(1997)
Proc. Information and Communications Security (ICICS'97)
, pp. 223-232
-
-
Kim, S.1
Park, S.2
Won, D.3
-
6
-
-
84958751721
-
Secure mobile agent using strong non-designated proxy signature
-
LNCS 2119, Springer-Verlag
-
B. Lee, H. Kim, and K. Kim, "Secure Mobile Agent Using Strong Non-Designated Proxy Signature," Proc. Information Security and Privacy (ACISP'01), LNCS 2119, Springer-Verlag, pp. 474-486, 2001.
-
(2001)
Proc. Information Security and Privacy (ACISP'01)
, pp. 474-486
-
-
Lee, B.1
Kim, H.2
Kim, K.3
-
7
-
-
35248866917
-
An analysis of proxy signatures: Is a secure channel necessary?
-
LNCS 2612, Springer-Verlag
-
J.-Y. Lee, J. H. Cheon, and S. Kim, "An Analysis of Proxy Signatures: Is a Secure Channel Necessary?" Proc. Topics in Cryptology (CT-RSA 2003), LNCS 2612, Springer-Verlag, pp. 68-79, 2003.
-
(2003)
Proc. Topics in Cryptology (CT-RSA 2003)
, pp. 68-79
-
-
Lee, J.-Y.1
Cheon, J.H.2
Kim, S.3
-
9
-
-
0030231965
-
Proxy signature: Delegation of the power to sign messages
-
Sep.
-
M. Mambo, K. Usuda, and E. Okamoto, "Proxy Signature: Delegation of the Power to Sign Messages." IEICE Trans. Fundamentals, vol. E79-A, no. 9, pp. 1338-1353, Sep. 1996.
-
(1996)
IEICE Trans. Fundamentals
, vol.E79-A
, Issue.9
, pp. 1338-1353
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
10
-
-
0029717329
-
Proxy signatures for delegating signing operation
-
ACM Press
-
M. Mambo, K. Usuda, E. Okamoto, "Proxy Signatures for Delegating Signing Operation," Proc. 3rd ACM Conference on Computer and Communications Security (CCS'96), ACM Press, pp. 48-57, 1996.
-
(1996)
Proc. 3rd ACM Conference on Computer and Communications Security (CCS'96)
, pp. 48-57
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
11
-
-
26444603424
-
Proactive Two-party signatures for user authentication
-
The Internet Society
-
A. Nicolosi, M. Krohn, Y. Dodis, and D. Mazieres, "Proactive Two-Party Signatures for User Authentication." Proc. 10th Annual Network and Distributed System Security Symposium (NDSS'03), The Internet Society, 2003. http://www.isoc.org/isoc/conferences/ndss/
-
(2003)
Proc. 10th Annual Network and Distributed System Security Symposium (NDSS'03)
-
-
Nicolosi, A.1
Krohn, M.2
Dodis, Y.3
Mazieres, D.4
-
12
-
-
84956995852
-
A digital nominative proxy signature scheme for mobile communications
-
LNCS 2229, Springer-Verlag
-
H.-U. Park and I.-Y. Lee. "A Digital Nominative Proxy Signature Scheme for Mobile Communications," Proc. Information and Communications Security (ICICS'01), LNCS 2229, pp. 451-455, Springer-Verlag, 2001.
-
(2001)
Proc. Information and Communications Security (ICICS'01)
, pp. 451-455
-
-
Park, H.-U.1
Lee, I.-Y.2
-
13
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
D. Pointcheval and J. Stern, "Security Arguments for Digital Signatures and Blind Signatures," Journal of Cryptology, Vol 13, No. 3, pp. 361-369, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.3
, pp. 361-369
-
-
Pointcheval, D.1
Stern, J.2
-
14
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Feb.
-
R.L. Rivest, A. Shamir, and L.M. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Communications of the ACM, vol. 21, No. 2, pp. 120-126, Feb. 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
15
-
-
12344258539
-
Efficient signature generation by smart cards
-
C. Schnorr, "Efficient Signature Generation by Smart Cards," Journal of Cryptology, vol. 4, no. 3, pp. 161-174, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.1
-
16
-
-
0033354258
-
Threshold proxy signatures
-
Sept.
-
H.-M. Sun, N.-Y. Lee, and T. Hwang, "Threshold Proxy Signatures," IEE Proc.-Computers & Digital Techniques, vol. 146, no. 5, pp. 259-263, Sept. 1999.
-
(1999)
IEE Proc.-computers & Digital Techniques
, vol.146
, Issue.5
, pp. 259-263
-
-
Sun, H.-M.1
Lee, N.-Y.2
Hwang, T.3
-
17
-
-
35048825374
-
Security analysis of some proxy signatures
-
LNCS 2971, Springer-Verlag, Preliminary version
-
G. Wang, F. Bao, J. Zhou, and R. H. Deng, "Security Analysis of Some Proxy Signatures," Proc. Information Security and Cryptology - ICISC 2003, LNCS 2971, Springer-Verlag, pp. 305-319, 2004, Preliminary version is available at http://sprint.iacr.org/2003/196.
-
(2004)
Proc. Information Security and Cryptology - ICISC 2003
, pp. 305-319
-
-
Wang, G.1
Bao, F.2
Zhou, J.3
Deng, R.H.4
-
18
-
-
13844266307
-
Comments on a threshold proxy signature scheme based on the RSA cryptosystem
-
IEEE Computer Society, (to appear)
-
G. Wang, F. Bao, J. Zhou, and R. H. Deng, "Comments on a Threshold Proxy Signature Scheme Based on the RSA Cryptosystem," IEEE Transactions on Knowledge and Data Engineering, IEEE Computer Society, 2004 (to appear).
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
-
-
Wang, G.1
Bao, F.2
Zhou, J.3
Deng, R.H.4
-
20
-
-
84945962241
-
Threshold proxy signature schemes
-
LNCS 1396. Springer-Verlag
-
K. Zhang, "Threshold Proxy Signature Schemes," Proc. Information Security Workshop (ISW'97), LNCS 1396. Springer-Verlag, pp. 282-290, 1997.
-
(1997)
Proc. Information Security Workshop (ISW'97)
, pp. 282-290
-
-
Zhang, K.1
|