메뉴 건너뛰기




Volumn 33, Issue 2, 2007, Pages 88-93

Insider attacks on multi-proxy multi-signature schemes

Author keywords

Insider attack; Multi proxy; Multi signature; Proxy signature

Indexed keywords

COMPUTER NETWORKS; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; SECURITY OF DATA;

EID: 33846371427     PISSN: 00457906     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.compeleceng.2006.08.003     Document Type: Article
Times cited : (12)

References (16)
  • 1
    • 84958612917 scopus 로고    scopus 로고
    • Camenisch J, Stadler M. Efficient group signature schemes for large groups. Advances in cryptology. In: Proceedings of Crypto'97. Lect Notes Comput Sci (LNCS), vol. 1294. Springer-Verlag; 1997. p. 410-24.
  • 2
    • 33846375299 scopus 로고    scopus 로고
    • Hwang SJ, Shi CH. A simple multi-proxy signature schemes. In: Proceedings of the Tenth National Conference on Information Security. Hualien, Taiwan, ROC, 2000. p. 134-8.
  • 3
    • 33846370017 scopus 로고    scopus 로고
    • Hwang SJ, Chen CC. A new proxy multi-signature scheme. in: Proc of International Workshop on Cryptology and Network Security. Taipei, Taiwan, ROC, September 2001. p. 199-204.
  • 4
    • 0141525046 scopus 로고    scopus 로고
    • New multi-proxy multi-signature schemes
    • Hwang S.J., and Chen C.C. New multi-proxy multi-signature schemes. Appl Math Comput 147 (2004) 57-67
    • (2004) Appl Math Comput , vol.147 , pp. 57-67
    • Hwang, S.J.1    Chen, C.C.2
  • 5
    • 33846393068 scopus 로고    scopus 로고
    • Kim S, Park S, Won D. Proxy signatures, revisited. In: Proceedings of International Conference on Information and Communications Security (ICICS'97). Lect Notes Comput Sci (LNCS), vol. 1334. Springer-Verlag; 1997. p. 223-32.
  • 6
    • 84956860632 scopus 로고    scopus 로고
    • Lee NY, Hwang T, Wang CH. On Zhang's nonrepudiable proxy signature schemes. In: Proceedings of the Third Australasian Conference (ACISP'98). p. 415-22.
  • 7
    • 24944432316 scopus 로고    scopus 로고
    • Cryptanalysis of and improvement on the Hwang-Chen multi-proxy multi-signature schemes
    • Lyuu Y.D., and Wu M.L. Cryptanalysis of and improvement on the Hwang-Chen multi-proxy multi-signature schemes. Appl Math Comput 167 (2005) 729-739
    • (2005) Appl Math Comput , vol.167 , pp. 729-739
    • Lyuu, Y.D.1    Wu, M.L.2
  • 8
    • 0030231965 scopus 로고    scopus 로고
    • Mambo M, Usada K, Okamoto E. Proxy signatures: delegation of the power to sign messages. In: Proceedings of the IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E79-A(9) 1996. p. 1338-54.
  • 9
    • 0029717329 scopus 로고    scopus 로고
    • Mambo M, Usada K, Okamoto E. Proxy signatures for delegating signing operation. In: Proceedings of the Third ACM Conference on Computer and Comunication Security. New Delhi, India, January 1996. p. 48-57.
  • 10
    • 0032670844 scopus 로고    scopus 로고
    • An efficient nonrepudiable threshold proxy signatures with known signers
    • Sun H.M. An efficient nonrepudiable threshold proxy signatures with known signers. Comput Commun 22 8 (1999) 717-722
    • (1999) Comput Commun , vol.22 , Issue.8 , pp. 717-722
    • Sun, H.M.1
  • 11
    • 12344258539 scopus 로고
    • Efficient signature generation by smart cards
    • Schnorr C. Efficient signature generation by smart cards. J Cryptography 4 3 (1991) 161-174
    • (1991) J Cryptography , vol.4 , Issue.3 , pp. 161-174
    • Schnorr, C.1
  • 12
    • 1542335453 scopus 로고    scopus 로고
    • An improvement of nonrepudiable threshold proxy signature scheme with known signers
    • Tzeng S.F., Hwang M.S., and Yang C.Y. An improvement of nonrepudiable threshold proxy signature scheme with known signers. Comput Security 23 (2004) 174-178
    • (2004) Comput Security , vol.23 , pp. 174-178
    • Tzeng, S.F.1    Hwang, M.S.2    Yang, C.Y.3
  • 13
    • 0242372955 scopus 로고    scopus 로고
    • Wang GL, Han XX, Zhu B. On the security of two threshold signature schemes with traceable signers. In: Applied Cryptography and Network Security (ACNS 2003). Lect Notes Comput Sci (LNCS), vol. 2846. Springer-Verlag; 2003. p. 111-222.
  • 14
    • 4444372561 scopus 로고    scopus 로고
    • On the efficiency of nonrepudiable threshold proxy signatures with known signers
    • Yang C.Y., Tzeng S.F., and Hwang M.S. On the efficiency of nonrepudiable threshold proxy signatures with known signers. J Syst Software 73 (2004) 507-514
    • (2004) J Syst Software , vol.73 , pp. 507-514
    • Yang, C.Y.1    Tzeng, S.F.2    Hwang, M.S.3
  • 15
    • 0033875604 scopus 로고    scopus 로고
    • Proxy multi-signature scheme: a new type of proxy signature scheme
    • Yi L., Bai G., and Xiao G. Proxy multi-signature scheme: a new type of proxy signature scheme. Electron Lett 36 6 (2000) 527-528
    • (2000) Electron Lett , vol.36 , Issue.6 , pp. 527-528
    • Yi, L.1    Bai, G.2    Xiao, G.3
  • 16
    • 33846353391 scopus 로고    scopus 로고
    • Zhang K. Threshold proxy signature schemes. In: Proceedings of the 1997 Information Security Workshop. Japan, September 1997. p. 191-7.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.