메뉴 건너뛰기




Volumn 3822 LNCS, Issue , 2005, Pages 42-52

An ID-based verifiable encrypted signature scheme based on Hess's scheme

Author keywords

Bilinear pairings; Fair exchange; ID based cryptography; Verifiably encrypted signatures

Indexed keywords

COMPUTER PRIVACY; DATA PRIVACY; ELECTRONIC COMMERCE; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; MATHEMATICAL MODELS; SECURITY OF DATA;

EID: 33744934238     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11599548_4     Document Type: Conference Paper
Times cited : (38)

References (17)
  • 1
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Advances in Cryptology - CRYPTO'84. Springer-Verlag, Berlin Heidelberg New York
    • Shamir, A.: Identity-based cryptosystems and signature schemes. In: Advances in Cryptology - CRYPTO'84. Lecture Notes in Computer Science, Vol. 196. Springer-Verlag, Berlin Heidelberg New York (1984) 47-53.
    • (1984) Lecture Notes in Computer Science , vol.196 , pp. 47-53
    • Shamir, A.1
  • 2
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Advances in Cryptology- CRYPTO 2001. Springer-Verlag, Berlin Heidelberg New York
    • Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Advances in Cryptology- CRYPTO 2001. Lecture Notes in Computer Science, Vol. 2139. Springer-Verlag, Berlin Heidelberg New York (2001) 213-229.
    • (2001) Lecture Notes in Computer Science , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 3
    • 35248867510 scopus 로고    scopus 로고
    • Efficient identity based signature schemes based on pairings
    • Selected Areas in Cryptography 9th Annual International Workshop, SAC 2002. Springer-Verlag, Berlin Heidelberg New York
    • Hess, P.: Efficient identity based signature schemes based on pairings. In: Selected Areas in Cryptography 9th Annual International Workshop, SAC 2002. Lecture Notes in Computer Science, Vol. 2595. Springer-Verlag, Berlin Heidelberg New York (2003) 310-324.
    • (2003) Lecture Notes in Computer Science , vol.2595 , pp. 310-324
    • Hess, P.1
  • 4
    • 35248844436 scopus 로고    scopus 로고
    • An identity-based signature from gap Diffie-Hellman groups
    • Public Key Cryptography - PKC 2003. Springer-Verlag, Berlin Heidelberg New York
    • Cha, J.C., Cheon, J.H.: An identity-based signature from gap Diffie-Hellman groups. In: Public Key Cryptography - PKC 2003. Lecture Notes in Computer Science, Vol. 2567. Springer-Verlag, Berlin Heidelberg New York (2003) 18-30.
    • (2003) Lecture Notes in Computer Science , vol.2567 , pp. 18-30
    • Cha, J.C.1    Cheon, J.H.2
  • 5
    • 0037330749 scopus 로고    scopus 로고
    • An identity-based signature scheme from the Weil pairing
    • Yi,X.: An identity-based signature scheme from the Weil pairing. In: IEEE Communications Letters 7(2)(2003), pp. 76-78.
    • (2003) IEEE Communications Letters , vol.7 , Issue.2 , pp. 76-78
    • Yi, X.1
  • 6
    • 0037194815 scopus 로고    scopus 로고
    • ID-based signatures from pairings on elliptic curves
    • Paterson, K.G.: ID-Based Signatures from Pairings on Elliptic Curves. In: Electron. Lett., Vol.38, No.18, 2002, pp.1025-1026.
    • (2002) Electron. Lett. , vol.38 , Issue.18 , pp. 1025-1026
    • Paterson, K.G.1
  • 7
    • 63449088479 scopus 로고    scopus 로고
    • Efficient ID-based blind signature and proxy signature from bilinear pairings
    • ACISP 03. Springer-Verlag, Berlin Heidelberg New York
    • Zhang, F., Kim, K.: Efficient ID-based blind signature and proxy signature from bilinear pairings. In: ACISP 03. Lecture Notes in Computer Science, Vol. 2727. Springer-Verlag, Berlin Heidelberg New York (2003) 312-323.
    • (2003) Lecture Notes in Computer Science , vol.2727 , pp. 312-323
    • Zhang, F.1    Kim, K.2
  • 8
    • 26444570370 scopus 로고    scopus 로고
    • Provable security of ID-baaed proxy signature schemes
    • Proc. 2005 International Conference on Computer Networks and Mobile Computing (ICCNMC'05). Springer-Verlag, Berlin Heidelberg New York
    • Gu, C.X., Zhu, Y.F.: Provable Security of ID-baaed Proxy Signature Schemes. In: Proc. 2005 International Conference on Computer Networks and Mobile Computing (ICCNMC'05). Lecture Notes in Computer Science, Vol. 3619. Springer-Verlag, Berlin Heidelberg New York (2005) 1277-1286.
    • (2005) Lecture Notes in Computer Science , vol.3619 , pp. 1277-1286
    • Gu, C.X.1    Zhu, Y.F.2
  • 9
    • 84957616594 scopus 로고    scopus 로고
    • Optimistic fair exchange of signatures
    • Advances in Cryptology - EUROCRYPT 1998. Springer-Verlag, Berlin Heidelberg New York
    • Asokan, N., Shoup, V., Waidner, M.: Optimistic fair exchange of signatures. In: Advances in Cryptology - EUROCRYPT 1998. Lecture Notes in Computer Science vol. 1403. Springer-Verlag, Berlin Heidelberg New York (1998) 591-606.
    • (1998) Lecture Notes in Computer Science , vol.1403 , pp. 591-606
    • Asokan, N.1    Shoup, V.2    Waidner, M.3
  • 10
    • 35248847060 scopus 로고    scopus 로고
    • Practical verifiable encryption and decryption of discrete logarithms
    • Advances in Cryptology - CRYPTO 2003. Springer-Verlag, Berlin Heidelberg New York
    • Camenisch, J., Shoup, V.: Practical verifiable encryption and decryption of discrete logarithms. In: Advances in Cryptology - CRYPTO 2003, Lecture Notes in Computer Science vol. 2729. Springer-Verlag, Berlin Heidelberg New York (2003) 195-211.
    • (2003) Lecture Notes in Computer Science , vol.2729 , pp. 195-211
    • Camenisch, J.1    Shoup, V.2
  • 11
    • 84948969076 scopus 로고    scopus 로고
    • Fair encryption of RSA keys
    • Proc. of Eurocrypt 2000. Springer-Verlag, Berlin Heidelberg New York
    • Poupard, G., Stern, J.: Fair encryption of RSA keys. In: Proc. of Eurocrypt 2000, Lecture Notes in Computer Science vol. 1807. Springer-Verlag, Berlin Heidelberg New York (2000) 172-189.
    • (2000) Lecture Notes in Computer Science , vol.1807 , pp. 172-189
    • Poupard, G.1    Stern, J.2
  • 12
    • 21144441197 scopus 로고    scopus 로고
    • Aggregate and verifiably encrypted signature from bilinear maps
    • Eurocrypt 2003. Springer-Verlag, Berlin Heidelberg New York
    • Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and Verifiably Encrypted Signature from Bilinear Maps. In: Eurocrypt 2003. Lecture Notes in Computer Science, Vol. 2248. Springer-Verlag, Berlin Heidelberg New York (2003) 514-532.
    • (2003) Lecture Notes in Computer Science , vol.2248 , pp. 514-532
    • Boneh, D.1    Gentry, C.2    Lynn, B.3    Shacham, H.4
  • 13
    • 33744931858 scopus 로고    scopus 로고
    • A scheme of fair exchange of signatures based on bilinear aggregate signatures
    • Dec.
    • Li, M.D., Yang, Y.X., Ma, C.G., Cai, M.C.: A scheme of fair exchange of signatures based on bilinear aggregate signatures. In: Journal of China Institute of Communications, 25(12):59-64. Dec. 2005.
    • (2005) Journal of China Institute of Communications , vol.25 , Issue.12 , pp. 59-64
    • Li, M.D.1    Yang, Y.X.2    Ma, C.G.3    Cai, M.C.4
  • 16
    • 3142585398 scopus 로고    scopus 로고
    • Verifiable encryption of digital signatures and applications
    • February
    • Ateniese, G.: Verifiable Encryption of Digital Signatures and Applications. In: ACM Transactions on Information and System Security, Vol. 7, No. 1, February 2004, Pages 1C20.
    • (2004) ACM Transactions on Information and System Security , vol.7 , Issue.1
    • Ateniese, G.1
  • 17
    • 23044517520 scopus 로고    scopus 로고
    • Efficient scalar multiplications on elliptic curves without repeated doublings and their practical performance
    • ACISP 2000. Springer-Verlag, Berlin Heidelberg New York
    • Sakai, Y., Sakurai, K.: Efficient Scalar Multiplications on Elliptic Curves without Repeated Doublings and Their Practical Performance. In: ACISP 2000. Lecture Notes in Computer Science, Vol. 1841. Springer-Verlag, Berlin Heidelberg New York (2000) 59-73.
    • (2000) Lecture Notes in Computer Science , vol.1841 , pp. 59-73
    • Sakai, Y.1    Sakurai, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.