메뉴 건너뛰기




Volumn 60, Issue 5, 2004, Pages 3249-3253

Proxy signature scheme with multiple original signers for wireless E-commerce applications

Author keywords

Digital signature; E commerce; Proxy signature; Wireless communications

Indexed keywords

ORIGINAL SIGNERS; PROXY SIGNATURES; TICKET BOOKING; WIRELESS COMMUNICATIONS;

EID: 17144406359     PISSN: 15502252     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (6)

References (20)
  • 3
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • April
    • S. Goldwasser, S. Micali, and R. Rivest, "A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks," SIAM Journal of Computing, vol.17, no. 2, pp. 281-308, April 1988.
    • (1988) SIAM Journal of Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 4
    • 0242410360 scopus 로고    scopus 로고
    • A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem
    • M.-S. Hwang, E. J.-L. Lu, and I.-C. Lin, "A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem," IEEE Trans. Knowledge and Data Engineering, vol. 15, no. 6, pp. 1552-1560, 2003.
    • (2003) IEEE Trans. Knowledge and Data Engineering , vol.15 , Issue.6 , pp. 1552-1560
    • Hwang, M.-S.1    Lu, E.J.-L.2    Lin, I.-C.3
  • 6
    • 84958751721 scopus 로고    scopus 로고
    • Secure mobile agent using strong non-designated proxy signature
    • LNCS 2119, Springer-Verlag
    • B. Lee, H. Kim, and K. Kim, "Secure Mobile Agent Using Strong Non-Designated Proxy Signature," Proc. Information Security and Privacy (ACISP'01), LNCS 2119, Springer-Verlag, pp. 474-486, 2001.
    • (2001) Proc. Information Security and Privacy (ACISP'01) , pp. 474-486
    • Lee, B.1    Kim, H.2    Kim, K.3
  • 7
    • 35248866917 scopus 로고    scopus 로고
    • An analysis of proxy signatures: Is a secure channel necessary?
    • LNCS 2612, Springer-Verlag
    • J.-Y. Lee, J. H. Cheon, and S. Kim, "An Analysis of Proxy Signatures: Is a Secure Channel Necessary?" Proc. Topics in Cryptology (CT-RSA 2003), LNCS 2612, Springer-Verlag, pp. 68-79, 2003.
    • (2003) Proc. Topics in Cryptology (CT-RSA 2003) , pp. 68-79
    • Lee, J.-Y.1    Cheon, J.H.2    Kim, S.3
  • 9
    • 0030231965 scopus 로고    scopus 로고
    • Proxy signature: Delegation of the power to sign messages
    • Sep.
    • M. Mambo, K. Usuda, and E. Okamoto, "Proxy Signature: Delegation of the Power to Sign Messages." IEICE Trans. Fundamentals, vol. E79-A, no. 9, pp. 1338-1353, Sep. 1996.
    • (1996) IEICE Trans. Fundamentals , vol.E79-A , Issue.9 , pp. 1338-1353
    • Mambo, M.1    Usuda, K.2    Okamoto, E.3
  • 12
    • 84956995852 scopus 로고    scopus 로고
    • A digital nominative proxy signature scheme for mobile communications
    • LNCS 2229, Springer-Verlag
    • H.-U. Park and I.-Y. Lee. "A Digital Nominative Proxy Signature Scheme for Mobile Communications," Proc. Information and Communications Security (ICICS'01), LNCS 2229, pp. 451-455, Springer-Verlag, 2001.
    • (2001) Proc. Information and Communications Security (ICICS'01) , pp. 451-455
    • Park, H.-U.1    Lee, I.-Y.2
  • 13
    • 0000901529 scopus 로고    scopus 로고
    • Security arguments for digital signatures and blind signatures
    • D. Pointcheval and J. Stern, "Security Arguments for Digital Signatures and Blind Signatures," Journal of Cryptology, Vol 13, No. 3, pp. 361-369, 2000.
    • (2000) Journal of Cryptology , vol.13 , Issue.3 , pp. 361-369
    • Pointcheval, D.1    Stern, J.2
  • 14
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Feb.
    • R.L. Rivest, A. Shamir, and L.M. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Communications of the ACM, vol. 21, No. 2, pp. 120-126, Feb. 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 15
    • 12344258539 scopus 로고
    • Efficient signature generation by smart cards
    • C. Schnorr, "Efficient Signature Generation by Smart Cards," Journal of Cryptology, vol. 4, no. 3, pp. 161-174, 1991.
    • (1991) Journal of Cryptology , vol.4 , Issue.3 , pp. 161-174
    • Schnorr, C.1
  • 17
    • 35048825374 scopus 로고    scopus 로고
    • Security analysis of some proxy signatures
    • LNCS 2971, Springer-Verlag, Preliminary version
    • G. Wang, F. Bao, J. Zhou, and R. H. Deng, "Security Analysis of Some Proxy Signatures," Proc. Information Security and Cryptology - ICISC 2003, LNCS 2971, Springer-Verlag, pp. 305-319, 2004, Preliminary version is available at http://sprint.iacr.org/2003/196.
    • (2004) Proc. Information Security and Cryptology - ICISC 2003 , pp. 305-319
    • Wang, G.1    Bao, F.2    Zhou, J.3    Deng, R.H.4
  • 18
    • 13844266307 scopus 로고    scopus 로고
    • Comments on a threshold proxy signature scheme based on the RSA cryptosystem
    • IEEE Computer Society, (to appear)
    • G. Wang, F. Bao, J. Zhou, and R. H. Deng, "Comments on a Threshold Proxy Signature Scheme Based on the RSA Cryptosystem," IEEE Transactions on Knowledge and Data Engineering, IEEE Computer Society, 2004 (to appear).
    • (2004) IEEE Transactions on Knowledge and Data Engineering
    • Wang, G.1    Bao, F.2    Zhou, J.3    Deng, R.H.4
  • 20
    • 84945962241 scopus 로고    scopus 로고
    • Threshold proxy signature schemes
    • LNCS 1396. Springer-Verlag
    • K. Zhang, "Threshold Proxy Signature Schemes," Proc. Information Security Workshop (ISW'97), LNCS 1396. Springer-Verlag, pp. 282-290, 1997.
    • (1997) Proc. Information Security Workshop (ISW'97) , pp. 282-290
    • Zhang, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.