메뉴 건너뛰기




Volumn 1, Issue , 2007, Pages 866-868

A new type of proxy ring signature scheme with revocable anonymity

Author keywords

[No Author keywords available]

Indexed keywords

REAL TIME SYSTEMS; USER INTERFACES; VERIFICATION;

EID: 35148830834     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SNPD.2007.63     Document Type: Conference Paper
Times cited : (5)

References (12)
  • 1
    • 0030231965 scopus 로고    scopus 로고
    • Proxy signature:Delegation of the power to sign messages
    • September
    • M. Mambo, K. Usuda, and E. Okamoto. Proxy signature:Delegation of the power to sign messages. IEICE Trans. Fundamentals, Vol. E79-A, No.9:1338-1353, September, 1996.
    • (1996) IEICE Trans. Fundamentals , vol.E79-A , Issue.9 , pp. 1338-1353
    • Mambo, M.1    Usuda, K.2    Okamoto, E.3
  • 2
    • 84946833891 scopus 로고    scopus 로고
    • How to leak a secret
    • Advances in Cryptology-Asiacrypt 2001, Springer-Verlag
    • R.L. Rivest, A. Shamir and Y. Tauman. How to leak a secret. Advances in Cryptology-Asiacrypt 2001, LNCS 2248, pp.552-565, Springer-Verlag, 2001.
    • (2001) LNCS , vol.2248 , pp. 552-565
    • Rivest, R.L.1    Shamir, A.2    Tauman, Y.3
  • 4
    • 0033875604 scopus 로고    scopus 로고
    • Proxy multi-signature scheme: A new type of proxy signature scheme
    • L. Yi, G. Bai and G. Xiao. Proxy multi-signature scheme: A new type of proxy signature scheme. Electronics Letters, 36(6):527-528, 2000.
    • (2000) Electronics Letters , vol.36 , Issue.6 , pp. 527-528
    • Yi, L.1    Bai, G.2    Xiao, G.3
  • 5
    • 0000064722 scopus 로고    scopus 로고
    • Threshold proxy signature schemes
    • Japan, pp, September
    • K. Zhang. Threshold proxy signature schemes. 1997 Information Security Workshop, Japan, pp.191-197, September, 1997.
    • (1997) 1997 Information Security Workshop , pp. 191-197
    • Zhang, K.1
  • 6
    • 1642614204 scopus 로고    scopus 로고
    • Digital proxy blind signature schemes based on DLP and ECDLP
    • Z. Tan, Z. Liu and C. Tang. Digital proxy blind signature schemes based on DLP and ECDLP. MM Research Preprints, No.21, pp.212-217, 2002.
    • (2002) MM Research Preprints , Issue.21 , pp. 212-217
    • Tan, Z.1    Liu, Z.2    Tang, C.3
  • 7
    • 35148889217 scopus 로고    scopus 로고
    • A.K. Awasthi and S. Lal. ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings. Cryptology ePrint Archive, Report 2004/184, available at http://eprint.iacr.org,2004.
    • A.K. Awasthi and S. Lal. ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings. Cryptology ePrint Archive, Report 2004/184, available at http://eprint.iacr.org,2004.
  • 8
    • 21144446236 scopus 로고    scopus 로고
    • New proxy signature, proxy blind signature and proxy ring signature schemes from bilinear pairings
    • available at
    • F. Zhang, R.S. Naini, and C.Y Lin. New proxy signature, proxy blind signature and proxy ring signature schemes from bilinear pairings. Cryptology ePrint Archive, available at: http://eprint.iacr.org/2003/, 2003.
    • (2003) Cryptology ePrint Archive
    • Zhang, F.1    Naini, R.S.2    Lin, C.Y.3
  • 9
    • 33745561884 scopus 로고    scopus 로고
    • Ring signatures:stronger definitions, and constructions without random oracles
    • S. Halevi and T. Rabin, editors, Theory of Cryptography ł TCC, Springer-Verlag
    • A. Bender, J. Katz, and R. Morselli. Ring signatures:stronger definitions, and constructions without random oracles. In S. Halevi and T. Rabin, editors, Theory of Cryptography ł TCC 2006, Lecture Notes in Computer Science, Springer-Verlag, vol.38762:60-79,2006.
    • (2006) Lecture Notes in Computer Science , vol.38762 , pp. 60-79
    • Bender, A.1    Katz, J.2    Morselli, R.3
  • 10
    • 84937420077 scopus 로고    scopus 로고
    • Threshold ring signatures and applications to ad-hoc groups
    • Moti Yung, editor, Advances in Cryptology-CRYPTO, Springer-Verlag
    • E. Bresson, J. Stern, and M. Szydlo. Threshold ring signatures and applications to ad-hoc groups. In Moti Yung, editor, Advances in Cryptology-CRYPTO 2002, Lecture Notes in Computer Science, Springer-Verlag, vol.2442:465-480, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2442 , pp. 465-480
    • Bresson, E.1    Stern, J.2    Szydlo, M.3
  • 11
    • 33745675937 scopus 로고    scopus 로고
    • Toward the fair anonymous signatures: Deniable ring signatures
    • D.Pointcheval, editor, CT-RSA'06, Springer-Verlag
    • Y. Komano, K. Ohta, A. Shimbo, and S. Kawamura. Toward the fair anonymous signatures: Deniable ring signatures. In D.Pointcheval, editor, CT-RSA'06, Lecture Notes in Computer Science, Springer-Verlag, vol.3860:174-191, 2006.
    • (2006) Lecture Notes in Computer Science , vol.3860 , pp. 174-191
    • Komano, Y.1    Ohta, K.2    Shimbo, A.3    Kawamura, S.4
  • 12
    • 79960836060 scopus 로고    scopus 로고
    • Deniable ring authentication
    • M. Naor. Deniable ring authentication. In CRYPTO 2002, pp.481-498, 2002.
    • (2002) In CRYPTO 2002 , pp. 481-498
    • Naor, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.