메뉴 건너뛰기




Volumn 1, Issue , 2004, Pages 807-812

A new signature scheme: Joint-signature

Author keywords

Digital signature; M Commerce; M Payment; Security protocol

Indexed keywords

BANDWIDTH; COMPUTATIONAL METHODS; COMPUTER NETWORKS; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; NETWORK PROTOCOLS; PROBLEM SOLVING; SECURITY OF DATA; SERVERS;

EID: 2442591801     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (11)

References (17)
  • 2
    • 0038337735 scopus 로고    scopus 로고
    • Digital signature scheme resulted from identification protocol by elliptic curve cryptosystem
    • Chen, T.-S., Huang , G.-S., Liu, T.-P., and Chung, Y.-F., Digital signature scheme resulted from identification protocol by elliptic curve cryptosystem, In Proceedings of the 2002 IEEE TENCON'02, Vol. 1, pp. 192-195, 2002.
    • (2002) Proceedings of the 2002 IEEE TENCON'02 , vol.1 , pp. 192-195
    • Chen, T.-S.1    Huang, G.-S.2    Liu, T.-P.3    Chung, Y.-F.4
  • 6
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • July
    • ElGamal, T., A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transactions on Information Theory, Vol. IT-31, pp. 469-472, July, 1985.
    • (1985) IEEE Transactions on Information Theory , vol.IT-31 , pp. 469-472
    • Elgamal, T.1
  • 7
    • 2442449839 scopus 로고    scopus 로고
    • An asymmetric authentication protocol for M-Commerce applications
    • He, L. and Zhang, N., An asymmetric authentication protocol for M-Commerce applications, In Proceedings of the eighth IEEE ISCC'2003, Vol. 1, pp. 244-250, 2003.
    • (2003) Proceedings of the Eighth IEEE ISCC'2003 , vol.1 , pp. 244-250
    • He, L.1    Zhang, N.2
  • 8
    • 0010567510 scopus 로고    scopus 로고
    • Proxy signatures
    • revisited, In Proceedings of ICICS97, Springer Verlag
    • Kim, S., Park, S. and Won, D., Proxy signatures, revisited, In Proceedings of ICICS97, LNCS 1334, Springer Verlag, pp. 223-232, 1997.
    • (1997) LNCS , vol.1334 , pp. 223-232
    • Kim, S.1    Park, S.2    Won, D.3
  • 9
    • 84958968002 scopus 로고    scopus 로고
    • Secure transactions with mobile agents in hostile environments
    • Springer Verlag
    • Kotzanikolaou, P., Burmester, M. and Chrissikopoulos, V., Secure transactions with mobile agents in hostile environments, LNCS 1841, Springer Verlag, pp. 289-297, 2000.
    • (2000) LNCS , vol.1841 , pp. 289-297
    • Kotzanikolaou, P.1    Burmester, M.2    Chrissikopoulos, V.3
  • 10
    • 0030231965 scopus 로고    scopus 로고
    • Proxy signatures: Delegation of the power to sign messages, IEICE transactions on fundamentals of electronics
    • Mambo, M., Usuda, K. and Okamoto, E., Proxy signatures: delegation of the power to sign messages, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E79-A, No. 9, pp. 1338-1354, 1996.
    • (1996) Communications and Computer Sciences , vol.E79-A , Issue.9 , pp. 1338-1354
    • Mambo, M.1    Usuda, K.2    Okamoto, E.3
  • 11
    • 85028812333 scopus 로고
    • On verifiable implicit asking protocols for RSA computation
    • Proceedings of Auscrypt'92, Springer Verlag
    • Matsumoto, T., Imai, H., Laih, C. S. and Yen, S. M., On verifiable implicit asking protocols for RSA computation, In Proceedings of Auscrypt'92, LNCS 718, Springer Verlag, pp. 296-307, 1993.
    • (1993) LNCS , vol.718 , pp. 296-307
    • Matsumoto, T.1    Imai, H.2    Laih, C.S.3    Yen, S.M.4
  • 12
    • 85031767993 scopus 로고
    • Speeding up computation with insecrue auxiliary devices
    • Proceedings of Crypto'88, Springer Verlag
    • Matsumoto, T., Kato, K. and Imai, H., Speeding up computation with insecrue auxiliary devices, In Proceedings of Crypto'88, LNCS 403, Springer Verlag, pp. 497-506, 1989.
    • (1989) LNCS , vol.403 , pp. 497-506
    • Matsumoto, T.1    Kato, K.2    Imai, H.3
  • 14
  • 17
    • 2442445658 scopus 로고    scopus 로고
    • 3G security; security architecture
    • Technical Specification 3GPP, 3G security; security architecture, http//www.3gpp.org, 2000.
    • (2000) Technical Specification 3GPP


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.