메뉴 건너뛰기




Volumn 3108, Issue , 2004, Pages 200-211

Generic construction of certificateless signature

Author keywords

Certificateless signature; Identity based signature; Public key signature

Indexed keywords

ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; SECURITY OF DATA;

EID: 35048832495     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-27800-9_18     Document Type: Article
Times cited : (229)

References (16)
  • 1
    • 0345490607 scopus 로고    scopus 로고
    • Certificateless public key cryptography
    • Asiacrypt 2003
    • S. S. Al-Riyami and K. G. Peterson, "Certificateless public key cryptography," Asiacrypt 2003, LNCS Vol. 2894, pp. 452-474, 2003.
    • (2003) LNCS , vol.2894 , pp. 452-474
    • Al-Riyami, S.S.1    Peterson, K.G.2
  • 2
    • 24944468450 scopus 로고    scopus 로고
    • A concrete security treatment of symmetric encryption: Analysis of the DES modes of operation
    • IEEE
    • M. Bellare, A. Desai, D. Jokipii, and P. Rogaway, "A concrete security treatment of symmetric encryption: analysis of the DES modes of operation," FOCS 1997, IEEE, 1997.
    • (1997) FOCS 1997
    • Bellare, M.1    Desai, A.2    Jokipii, D.3    Rogaway, P.4
  • 3
    • 84874324906 scopus 로고    scopus 로고
    • Identity based encryption from the Weil pairing
    • Crypto 2001
    • D. Boneh and M. Franklin, "Identity based encryption from the Weil pairing," Crypto 2001, LNCS Vol. 2139, pp. 213-229, 2001.
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 4
    • 0037623983 scopus 로고    scopus 로고
    • Identity based encryption from the Weil pairing
    • D. Boneh and M. Franklin, "Identity based encryption from the Weil pairing," SIAM J. of Computing, Vol. 32, No. 3, pp. 586-615, 2003.
    • (2003) SIAM J. of Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 6
    • 35248844436 scopus 로고    scopus 로고
    • An identity-based signature from gap Diffie-Hellman groups
    • PKC 2003
    • J. C. Cha and J. H. Cheon, "An identity-based signature from gap Diffie-Hellman groups," PKC 2003, LNCS Vol. 2567, pp. 18-30, 2003.
    • (2003) LNCS , vol.2567 , pp. 18-30
    • Cha, J.C.1    Cheon, J.H.2
  • 7
    • 84959165880 scopus 로고
    • A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory
    • Eurocrypt 1988
    • L. C. Guillou and J. J. Quisquater, "A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory," Eurocrypt 1988, LNCS Vol. 330, pp. 123-128, 1988.
    • (1988) LNCS , vol.330 , pp. 123-128
    • Guillou, L.C.1    Quisquater, J.J.2
  • 8
    • 84947558992 scopus 로고
    • A "paradoxical" identity-based signature scheme resulting from zero-knowledge
    • Crypto 1988
    • L. C. Guillou and J. J. Quisquater "A "paradoxical" identity-based signature scheme resulting from zero-knowledge," Crypto 1988, LNCS Vol. 403, pp. 216-231, 1988.
    • (1988) LNCS , vol.403 , pp. 216-231
    • Guillou, L.C.1    Quisquater, J.J.2
  • 9
    • 35248866223 scopus 로고    scopus 로고
    • Certificate-based encryption and the certificate revocation problem
    • Eurocrypt 2003
    • C. Gentry, "Certificate-based encryption and the certificate revocation problem," Eurocrypt 2003, LNCS Vol. 2656, pp. 272-293, 2003.
    • (2003) LNCS , vol.2656 , pp. 272-293
    • Gentry, C.1
  • 10
    • 84937570422 scopus 로고
    • Self-certified public keys
    • Eurocrypt 1991
    • M. Girault, "Self-certified public keys," Eurocrypt 1991, LNCS Vol. 547, pp. 490-497, 1992.
    • (1992) LNCS , vol.547 , pp. 490-497
    • Girault, M.1
  • 11
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • S. Goldwasswer, S. Micali, and R. Rivest, "A digital signature scheme secure against adaptive chosen-message attacks," SIAM J. Computing, Vol 7, No 2, pp. 281-308, 1988.
    • (1988) SIAM J. Computing , vol.7 , Issue.2 , pp. 281-308
    • Goldwasswer, S.1    Micali, S.2    Rivest, R.3
  • 12
    • 35248867510 scopus 로고    scopus 로고
    • Efficient identity based signature schemes based on pairings
    • SAC 2002
    • F. Hess, "Efficient identity based signature schemes based on pairings," SAC 2002, LNCS Vol. 2595, pp. 310-324, 2003.
    • (2003) LNCS , vol.2595 , pp. 310-324
    • Hess, F.1
  • 13
    • 33645598062 scopus 로고    scopus 로고
    • A certificate-based signature scheme
    • CT-RSA 2004
    • G. Kang, J. H. Park, and S. G. Hahn "A certificate-based signature scheme," CT-RSA 2004, LNCS Vol. 2964, pp. 99-111, 2004.
    • (2004) LNCS , vol.2964 , pp. 99-111
    • Kang, G.1    Park, J.H.2    Hahn, S.G.3
  • 14
    • 0037194815 scopus 로고    scopus 로고
    • ID-based signatures from pairings on elliptic curves
    • K. G. Paterson, "ID-based signatures from pairings on elliptic curves," Electronics Letters Vol. 38 (18), pp. 1025-1026, 2002.
    • (2002) Electronics Letters , vol.38 , Issue.18 , pp. 1025-1026
    • Paterson, K.G.1
  • 15
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Crypto 1984
    • A. Shamir, "Identity-based cryptosystems and signature schemes," Crypto 1984, LNCS Vol. 196, pp. 47-53, 1984.
    • (1984) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.