메뉴 건너뛰기




Volumn 3619, Issue , 2005, Pages 836-844

A novel and secure non-designated proxy signature scheme for mobile agents

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER NETWORKS; SECURITY OF DATA; SOFTWARE AGENTS;

EID: 26444516527     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11534310_88     Document Type: Conference Paper
Times cited : (3)

References (15)
  • 3
    • 0030231965 scopus 로고    scopus 로고
    • Proxy signature: Delegation of the power to sign messages
    • Mambo, M., Usuda, K., and Okamoto, E. Proxy Signature: Delegation of the Power to Sign Messages. IEICE Transactions Fundamentals, E79-A(9): (1996) 1338-1353.
    • (1996) IEICE Transactions Fundamentals , vol.E79-A , Issue.9 , pp. 1338-1353
    • Mambo, M.1    Usuda, K.2    Okamoto, E.3
  • 5
    • 26444608339 scopus 로고    scopus 로고
    • Secure mobile agent using strong non-designated proxy Signature
    • Springer-Verlag, Berlin Heidelberg New York
    • Byoungcheon Lee, Heesun Kim, and Kwangjo Kim,"Secure Mobile Agent using Strong Non-designated Proxy signature", ACISP2001 Lecture Notes in Computer Science, Vol.1446. Springer-Verlag, Berlin Heidelberg New York (2001) 145-157.
    • (2001) ACISP2001 Lecture Notes in Computer Science , vol.1446 , pp. 145-157
    • Lee, B.1    Kim, H.2    Kim, K.3
  • 6
    • 84927727752 scopus 로고    scopus 로고
    • Security proofs for signature schemes[C]
    • Eurocrypt'96, Springer-verlag
    • Pointcheval.D,and Stern.J, Security Proofs for Signature Schemes[C], In Eurocrypt'96, LNCS 1070, Springer-verlag, (1996) 387-398.
    • (1996) LNCS , vol.1070 , pp. 387-398
    • Pointcheval, D.1    Stern, J.2
  • 7
    • 84921018856 scopus 로고    scopus 로고
    • A practical and provably secure Coalition-Resistant group signature scheme
    • Advances in Cryptology-Proceedings of CRYPTO 2000
    • G. Ateniese and J. Camenisch and M. Joye and G. Tsudik, A practical and provably secure Coalition-Resistant group signature scheme, Advances in Cryptology-Proceedings of CRYPTO 2000, LNCS 1880, (2000) 255-270.
    • (2000) LNCS , vol.1880 , pp. 255-270
    • Ateniese, G.1    Camenisch, J.2    Joye, M.3    Tsudik, G.4
  • 8
    • 0008317070 scopus 로고    scopus 로고
    • Group signature schemes and payment systems based on the discrete logarithm problem
    • PhD thesis, Hartung-Gorre Verlag, Konstanz, ISBN 3-89649-286-1
    • J. Camenisch, Group signature schemes and payment systems based on the discrete logarithm problem, PhD thesis, vol. 2 of ETH-Series in Information Security an Cryptography, Hartung-Gorre Verlag, Konstanz, 1998, ISBN 3-89649-286-1.
    • (1998) ETH-series in Information Security an Cryptography , vol.2
    • Camenisch, J.1
  • 9
    • 3042542825 scopus 로고    scopus 로고
    • An improved nominative proxy signature scheme for mobile communication, 18th International conference on Advanced Information
    • J.H.Zhang,Q.H. Wu, J.L. Wang,Y.M. Wang, An improved nominative proxy signature scheme for mobile communication, 18th International conference on Advanced Information Networking and Applications, (2004), 23-26.
    • (2004) Networking and Applications , pp. 23-26
    • Zhang, J.H.1    Wu, Q.H.2    Wang, J.L.3    Wang, Y.M.4
  • 10
    • 84937570422 scopus 로고
    • Self-certified public keys, Advances in Cryptology-Eurocrypt 1991
    • Springer-Verlag
    • M. Girault, Self-certified public keys, Advances in Cryptology-Eurocrypt 1991, LNCS 547, Springer-Verlag, (1991) 490-497.
    • (1991) LNCS , vol.547 , pp. 490-497
    • Girault, M.1
  • 12
    • 84927752554 scopus 로고    scopus 로고
    • Designated verifier proofs and their applications
    • Advances in Cryptology-eurocrypt 1996, Springer-Ver-lag
    • M. Jakobsson, K. Sako, and R. Impagliazzo, "Designated verifier proofs and their applications," Advances in Cryptology-Eurocrypt 1996, LNCS 1070, Springer-Ver-lag, (1996)143-154.
    • (1996) LNCS , vol.1070 , pp. 143-154
    • Jakobsson, M.1    Sako, K.2    Impagliazzo, R.3
  • 13
    • 1642614187 scopus 로고    scopus 로고
    • Strong proxy signature and its applications
    • B. Lee, H. Kim and K. Kim. Strong proxy signature and its applications. In Proceedings of SCIS, (2001) 243-247.
    • (2001) Proceedings of SCIS , pp. 243-247
    • Lee, B.1    Kim, H.2    Kim, K.3
  • 14
    • 84957685616 scopus 로고    scopus 로고
    • A practical and provably secure scheme for publicly verifiable secret sharing and its applications
    • Advances in Cryptology-EUROCRYPT '98, Springer-Verlag
    • FUJISAKI, E. and OKAMOTO, T., A Practical and Provably Secure Scheme for Publicly Verifiable Secret Sharing and Its Applications, Advances in Cryptology-EUROCRYPT '98, Lecture Notes in Computer Science, Vol. 1403, Springer-Verlag, (1998) pp. 32-46.
    • (1998) Lecture Notes in Computer Science , vol.1403 , pp. 32-46
    • Fujisaki, E.1    Okamoto, T.2
  • 15
    • 26444609473 scopus 로고    scopus 로고
    • Two modified nominative proxy signature schemes for mobile communication, 2005 IEEE networking
    • Tucson, Arizona, U.S.A
    • J.H Zhang, J.C Zou and Y.M Wang, Two Modified Nominative Proxy Signature Schemes for Mobile Communication, 2005 IEEE Networking, Sensing and Control Conference Proceedings, Tucson, Arizona, U.S.A, (2005) 1054-1058
    • (2005) Sensing and Control Conference Proceedings , pp. 1054-1058
    • Zhang, J.H.1    Zou, J.C.2    Wang, Y.M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.