메뉴 건너뛰기




Volumn 166, Issue 1, 2005, Pages 35-45

A robust (k, n) + 1 threshold proxy signature scheme based on factoring

Author keywords

Factoring; Improved RSA scheme; Proxy signature; Threshold signature

Indexed keywords

COMPUTER NETWORKS; CRYPTOGRAPHY; MATHEMATICAL MODELS; PROBLEM SOLVING; ROBUSTNESS (CONTROL SYSTEMS); THEOREM PROVING;

EID: 19044376277     PISSN: 00963003     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.amc.2004.04.104     Document Type: Article
Times cited : (16)

References (19)
  • 1
    • 0030231965 scopus 로고    scopus 로고
    • Proxy signatures: Delegation of the power to sign messages
    • M. Mambo, K. Usuda, and E. Okmamoto Proxy signatures: delegation of the power to sign messages IEICE Trans. Functional E79-A 9 1996 1338 1353
    • (1996) IEICE Trans. Functional , vol.E79-A , Issue.9 , pp. 1338-1353
    • Mambo, M.1    Usuda, K.2    Okmamoto, E.3
  • 3
    • 0000064722 scopus 로고    scopus 로고
    • Threshold proxy signature schemes
    • Japan, September
    • H. Zhang, Threshold proxy signature schemes, 1997 Information Security Workshop, Japan, September 1997, pp. 191-197
    • (1997) 1997 Information Security Workshop , pp. 191-197
    • Zhang, H.1
  • 4
    • 0032670844 scopus 로고    scopus 로고
    • An efficient nonrepudiable threshold proxy signature scheme with known signers
    • H.-M. Sun An efficient nonrepudiable threshold proxy signature scheme with known signers Computer Communications 22 1999 717 722
    • (1999) Computer Communications , vol.22 , pp. 717-722
    • Sun, H.-M.1
  • 6
    • 0035451175 scopus 로고    scopus 로고
    • New nonrepudiable threshold proxy signature scheme wit known signers
    • C.-L. Hsu, T.-S. Wu, and T.-C. Wu New nonrepudiable threshold proxy signature scheme wit known signers The Journal of System and Software 58 2001 119 124
    • (2001) The Journal of System and Software , vol.58 , pp. 119-124
    • Hsu, C.-L.1    Wu, T.-S.2    Wu, T.-C.3
  • 7
    • 0141518230 scopus 로고    scopus 로고
    • A secure nonrepudiable threshold proxy signature scheme with known signers
    • M.-S. Hwang, L.-C. Lin, and J.-L.L.U. Eric A secure nonrepudiable threshold proxy signature scheme with known signers Information 11 2 2000 137 144
    • (2000) Information , vol.11 , Issue.2 , pp. 137-144
    • Hwang, M.-S.1    Lin, L.-C.2    Eric, J.-L.L.U.3
  • 9
    • 0033875604 scopus 로고    scopus 로고
    • Proxy multi-signature scheme: A new type of proxy signature scheme
    • L. Yi, G. Bai, and G. Xiao Proxy multi-signature scheme: a new type of proxy signature scheme Electronics Letter 36 6 2000 527 528
    • (2000) Electronics Letter , vol.36 , Issue.6 , pp. 527-528
    • Yi, L.1    Bai, G.2    Xiao, G.3
  • 10
    • 0010533609 scopus 로고    scopus 로고
    • The specifiable proxy signature
    • Taipei, Taiwan, ROC, December
    • S.J. Hwang, C.-H. Shi, The specifiable proxy signature, National Computer symposium 1999, Taipei, Taiwan, ROC, December 1999, pp. 190-197
    • (1999) National Computer Symposium 1999 , pp. 190-197
    • Hwang, S.J.1    Shi, C.-H.2
  • 13
    • 0035416443 scopus 로고    scopus 로고
    • A threshold key escrow scheme based on public key cryptosystem
    • Z. Cao A threshold key escrow scheme based on public key cryptosystem Science in China (Series E) 44 4 2001 441 448
    • (2001) Science in China (Series E) , vol.44 , Issue.4 , pp. 441-448
    • Cao, Z.1
  • 14
    • 0141719369 scopus 로고    scopus 로고
    • Two classes of robust threshold key escrow schemes
    • Z. Cao Two classes of robust threshold key escrow schemes Journal of Software 14 6 2003 1164 1171
    • (2003) Journal of Software , vol.14 , Issue.6 , pp. 1164-1171
    • Cao, Z.1
  • 15
    • 84948954277 scopus 로고    scopus 로고
    • Practical threshold signatures
    • Springer-Verlag
    • V. Shoup Practical threshold signatures Eurocrypt'2000 LNCS 1807 2000 Springer-Verlag 207 220 http://www.shoup.net/papers
    • (2000) Eurocrypt'2000 LNCS , vol.1807 , pp. 207-220
    • Shoup, V.1
  • 16
    • 4243114091 scopus 로고    scopus 로고
    • Efficient generation of shared RSA keys
    • D. Boneh, and M. Franklin Efficient generation of shared RSA keys Journal of the ACM 48 4 2001 702 722
    • (2001) Journal of the ACM , vol.48 , Issue.4 , pp. 702-722
    • Boneh, D.1    Franklin, M.2
  • 17
    • 0036758977 scopus 로고    scopus 로고
    • Improvement of Shoup's threshold RSA signature scheme 405
    • G. Wang, S. Qing, and M. Wang Improvement of Shoup's threshold RSA signature scheme 405 Computer Research and Development 39 9 2002 1046 1050 (in Chinese)
    • (2002) Computer Research and Development , vol.39 , Issue.9 , pp. 1046-1050
    • Wang, G.1    Qing, S.2    Wang, M.3
  • 18
    • 84956979177 scopus 로고    scopus 로고
    • Threshold undeniable RSA signature schemes
    • Information and Communications Security (ICICS 2001) S. Qing T. Okamoto J. Zhou Springer-Verlag Berlin
    • G. Wang, S. Qing, M. Wang, and Z. Zhou Threshold undeniable RSA signature schemes S. Qing T. Okamoto J. Zhou Information and Communications Security (ICICS 2001) LNCS 2229 2001 Springer-Verlag Berlin 221 232
    • (2001) LNCS , vol.2229 , pp. 221-232
    • Wang, G.1    Qing, S.2    Wang, M.3    Zhou, Z.4
  • 19
    • 84947906522 scopus 로고    scopus 로고
    • The exact security of digital signatures - How to sign with RSA and Rabin
    • Proceedings of Eurocrypt 1996, May 1996 U. Maurer Springer-Verlag
    • M. Bellare, and P. Rogaway The exact security of digital signatures - how to sign with RSA and Rabin U. Maurer Proceedings of Eurocrypt 1996, May 1996 LNCS 1070 1996 Springer-Verlag 399 416
    • (1996) LNCS , vol.1070 , pp. 399-416
    • Bellare, M.1    Rogaway, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.