메뉴 건너뛰기




Volumn 178, Issue 3, 2008, Pages 756-765

New (t, n) threshold directed signature scheme with provable security

Author keywords

Bilinear pairings; Directed signature; Provable security; Threshold directed signature

Indexed keywords

DATA TRANSFER; MATHEMATICAL MODELS; SECURITY OF DATA;

EID: 35748948981     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2007.07.025     Document Type: Article
Times cited : (28)

References (24)
  • 1
    • 0142156713 scopus 로고    scopus 로고
    • Variations of Diffie-Hellman problem
    • ICICS 2003, Springer-Verlag pp. 301-312
    • Bao F., Deng R.H., and Zhu H. Variations of Diffie-Hellman problem. ICICS 2003. LNCS 2836 (2003), Springer-Verlag pp. 301-312
    • (2003) LNCS 2836
    • Bao, F.1    Deng, R.H.2    Zhu, H.3
  • 2
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Advances in Cryptology - CRYPTO'01, Springer-Verlag pp. 213-229
    • Boneh D., and Franklin M. Identity-based encryption from the Weil pairing. Advances in Cryptology - CRYPTO'01. LNCS 2139 (2001), Springer-Verlag pp. 213-229
    • (2001) LNCS 2139
    • Boneh, D.1    Franklin, M.2
  • 3
    • 84946840347 scopus 로고    scopus 로고
    • Short signatures from the Weil pairing
    • Advances in Cryptology - ASIACRYPT'01, Springer-Verlag pp. 514-532
    • Boneh D., Lynn B., and Shacham H. Short signatures from the Weil pairing. Advances in Cryptology - ASIACRYPT'01. LNCS 2248 (2001), Springer-Verlag pp. 514-532
    • (2001) LNCS 2248
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 4
    • 0027726717 scopus 로고
    • Random oracles are practical: a paradigm for designing efficient protocols
    • ACM Press, New York pp. 62-73
    • Bellare M., and Rogaway P. Random oracles are practical: a paradigm for designing efficient protocols. Proc of the 1st CCS (1993), ACM Press, New York pp. 62-73
    • (1993) Proc of the 1st CCS
    • Bellare, M.1    Rogaway, P.2
  • 5
    • 84948970342 scopus 로고
    • Designated confirmer signatures
    • Advances in Cryptology - EUROCRYPT'94, Springer-Verlag pp. 86-91
    • Chaum D. Designated confirmer signatures. Advances in Cryptology - EUROCRYPT'94. LNCS 950 (1994), Springer-Verlag pp. 86-91
    • (1994) LNCS 950
    • Chaum, D.1
  • 6
    • 0010252194 scopus 로고
    • Undeniable signatures
    • Advances in Cryptology - CRYPTO'89, Springer-Verlag pp. 212-216
    • Chaum D., and Antwerpen H. Undeniable signatures. Advances in Cryptology - CRYPTO'89. LNCS 435 (1989), Springer-Verlag pp. 212-216
    • (1989) LNCS 435
    • Chaum, D.1    Antwerpen, H.2
  • 7
    • 84947955350 scopus 로고
    • Cryptographically strong undeniable signatures unconditionlally secure for the signer
    • Advances in Cryptology - CRYPTO'91, Springer-Verlag pp. 470-484
    • Chaum D., Heijst E., and Pftzmann B. Cryptographically strong undeniable signatures unconditionlally secure for the signer. Advances in Cryptology - CRYPTO'91. LNCS 576 (1992), Springer-Verlag pp. 470-484
    • (1992) LNCS 576
    • Chaum, D.1    Heijst, E.2    Pftzmann, B.3
  • 9
    • 33846641752 scopus 로고    scopus 로고
    • Optimal resilient threshold GQ signatures
    • Chu C.K., and Tzeng W.G. Optimal resilient threshold GQ signatures. Information Sciences 177 8 (2007) 1834-1851
    • (2007) Information Sciences , vol.177 , Issue.8 , pp. 1834-1851
    • Chu, C.K.1    Tzeng, W.G.2
  • 10
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptively chosen message attacks
    • Goldwasser S., Micali S., and Rivest R. A digital signature scheme secure against adaptively chosen message attacks. SIAM Journal on Computing 17 2 (1988) 281-308
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 11
    • 35748957655 scopus 로고
    • A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory
    • Advances in Cryptology - EUROCRYPT'88, Springer-Verlag pp. 216-231
    • Guillou L.S., and Quisquater J.J. A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory. Advances in Cryptology - EUROCRYPT'88. LNCS 403 (1989), Springer-Verlag pp. 216-231
    • (1989) LNCS 403
    • Guillou, L.S.1    Quisquater, J.J.2
  • 12
    • 33644688053 scopus 로고    scopus 로고
    • A novel efficient (t, n) threshold proxy signature scheme
    • Huang H.F., and Chang C.C. A novel efficient (t, n) threshold proxy signature scheme. Information Sciences 176 10 (2006) 1338-1349
    • (2006) Information Sciences , vol.176 , Issue.10 , pp. 1338-1349
    • Huang, H.F.1    Chang, C.C.2
  • 13
    • 33750371530 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
    • Hsu C.L., Tsai K.Y., and Tsai P.L. Cryptanalysis and improvement of nonrepudiable threshold multi-proxy multi-signature scheme with shared verification. Information Sciences 177 2 (2007) 543-549
    • (2007) Information Sciences , vol.177 , Issue.2 , pp. 543-549
    • Hsu, C.L.1    Tsai, K.Y.2    Tsai, P.L.3
  • 14
    • 34447302232 scopus 로고    scopus 로고
    • A directed signature scheme based on RSA assumption
    • Lu R., and Cao Z. A directed signature scheme based on RSA assumption. International Journal of Network Security 2 3 (2006) 182-186
    • (2006) International Journal of Network Security , vol.2 , Issue.3 , pp. 182-186
    • Lu, R.1    Cao, Z.2
  • 15
    • 19044376277 scopus 로고    scopus 로고
    • A robust (k, n) + 1 threshold proxy signature scheme based on factoring
    • Lu R., Cao Z., and Zhu H. A robust (k, n) + 1 threshold proxy signature scheme based on factoring. Applied Mathematics and Computation 166 1 (2005) 35-45
    • (2005) Applied Mathematics and Computation , vol.166 , Issue.1 , pp. 35-45
    • Lu, R.1    Cao, Z.2    Zhu, H.3
  • 16
    • 10444252573 scopus 로고    scopus 로고
    • Threshold undeniable signature scheme based on conic
    • Lu R., Cao Z., and Zhou Y. Threshold undeniable signature scheme based on conic. Applied Mathematics and Computation 162 1 (2005) 165-177
    • (2005) Applied Mathematics and Computation , vol.162 , Issue.1 , pp. 165-177
    • Lu, R.1    Cao, Z.2    Zhou, Y.3
  • 17
    • 35748952969 scopus 로고
    • Modified Maurer-Yacobi's scheme and its applications
    • Advances in Cryptology - AUSCRYPT'92, Springer-Verlag pp. 308-323
    • Lim C.H., and Lee P.J. Modified Maurer-Yacobi's scheme and its applications. Advances in Cryptology - AUSCRYPT'92. LNCS 718 (1992), Springer-Verlag pp. 308-323
    • (1992) LNCS 718
    • Lim, C.H.1    Lee, P.J.2
  • 18
    • 33646775322 scopus 로고    scopus 로고
    • Universally convertible directed signatures
    • Advances in Cryptology - ASIACRYPT'05, Springer-Verlag pp. 682-701
    • Laguillaumie F., Paillier P., and Vergnaud D. Universally convertible directed signatures. Advances in Cryptology - ASIACRYPT'05. LNCS 3788 (2005), Springer-Verlag pp. 682-701
    • (2005) LNCS 3788
    • Laguillaumie, F.1    Paillier, P.2    Vergnaud, D.3
  • 19
    • 84982943258 scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • Advances in Cryptology - CRYPTO'91, Springer-Verlag pp. 129-140
    • Pedersen T. Non-interactive and information-theoretic secure verifiable secret sharing. Advances in Cryptology - CRYPTO'91. LNCS 576 (1992), Springer-Verlag pp. 129-140
    • (1992) LNCS 576
    • Pedersen, T.1
  • 20
    • 1642489925 scopus 로고    scopus 로고
    • OAEP reconsidered
    • Shoup V. OAEP reconsidered. Journal of Cryptology 15 4 (2002) 223-249
    • (2002) Journal of Cryptology , vol.15 , Issue.4 , pp. 223-249
    • Shoup, V.1
  • 21
    • 35748947096 scopus 로고    scopus 로고
    • V. Shoup, Sequences of games: a tool for taming complexity in security proofs, available at: http://eprint.iacr.org/2004/332.
  • 23
    • 33646940989 scopus 로고    scopus 로고
    • A traceable threshold signature scheme with multiple signing policies
    • Shao J., and Cao Z. A traceable threshold signature scheme with multiple signing policies. Computers & Security 25 3 (2006)
    • (2006) Computers & Security , vol.25 , Issue.3
    • Shao, J.1    Cao, Z.2
  • 24
    • 33845956283 scopus 로고    scopus 로고
    • Simulatability and security of certificateless threshold signatures
    • Wang L., Cao Z., Li X., and Qian H. Simulatability and security of certificateless threshold signatures. Information Sciences 177 6 (2007) 1382-1394
    • (2007) Information Sciences , vol.177 , Issue.6 , pp. 1382-1394
    • Wang, L.1    Cao, Z.2    Li, X.3    Qian, H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.