메뉴 건너뛰기




Volumn , Issue , 2006, Pages

Proxy signature schemes

Author keywords

[No Author keywords available]

Indexed keywords

ELECTRONIC COMMERCE; ELECTRONIC VOLTMETERS; MOBILE AGENTS; MOBILE TELECOMMUNICATION SYSTEMS;

EID: 42749106118     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICIEA.2006.257325     Document Type: Conference Paper
Times cited : (3)

References (27)
  • 2
    • 34249323356 scopus 로고    scopus 로고
    • On the security of a threshold proxy signature scheme using self-certified public keys
    • In the, Higher Education Press of China. Dec. 15-17, Beijing
    • L. F. Guo, G. L. Wang and B. Feng, "On the security of a threshold proxy signature scheme using self-certified public keys," In the Proc. of SKLOIS conference on information security and cryptology (CISC 2005), Higher Education Press of China. Dec. 15-17, 2005, Beijing.
    • (2005) Proc. of SKLOIS conference on information security and cryptology (CISC 2005)
    • Guo, L.F.1    Wang, G.L.2    Feng, B.3
  • 4
    • 0035451175 scopus 로고    scopus 로고
    • C. L. Hsu, T.-S. Wu and T.-C. Wu, New nonrepudiable threshold proxy signature scheme with known signers, The Journal of Systems and Software 58(2001), pp. 119-124, 2001.
    • C. L. Hsu, T.-S. Wu and T.-C. Wu, "New nonrepudiable threshold proxy signature scheme with known signers," The Journal of Systems and Software 58(2001), pp. 119-124, 2001.
  • 5
    • 24944436522 scopus 로고    scopus 로고
    • Convertible nominative signatures
    • Proc. of Information Security and Privacy ACISP'04, Springer-Verlag
    • Z. Huang and Y. Wang, "Convertible nominative signatures," in Proc. of Information Security and Privacy (ACISP'04), LNCS 3108, pp. 348-357, Springer-Verlag, 2004.
    • (2004) LNCS , vol.3108 , pp. 348-357
    • Huang, Z.1    Wang, Y.2
  • 6
    • 0242410360 scopus 로고    scopus 로고
    • A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem
    • Nov/Dec
    • M. S. Hwang, J. L Lu and L. C. Lin, "A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem," IEEE Trans. on Knowledge and Data Engineering, Vol. 15, No. 6, Nov/Dec 2003.
    • (2003) IEEE Trans. on Knowledge and Data Engineering , vol.15 , Issue.6
    • Hwang, M.S.1    Lu, J.L.2    Lin, L.C.3
  • 7
    • 0010567510 scopus 로고    scopus 로고
    • Proxy Signatures, revisited
    • Proceedings of ICICS'97, Springer-Verlag
    • S. J. Kim, S. J. Park, D. H. Won, "Proxy Signatures, revisited," in the Proceedings of ICICS'97, Lecture Notes in Computer Science 1334, pp. 223-232, Springer-Verlag.
    • Lecture Notes in Computer Science , vol.1334 , pp. 223-232
    • Kim, S.J.1    Park, S.J.2    Won, D.H.3
  • 8
    • 1642614187 scopus 로고    scopus 로고
    • Strong proxy signature and its applications
    • B. Lee, H. Kim, and K. Kim, "Strong proxy signature and its applications," in the Proceedings of SCIS2001, pp. 603-608, 2001.
    • (2001) Proceedings of SCIS2001 , pp. 603-608
    • Lee, B.1    Kim, H.2    Kim, K.3
  • 10
    • 34249285867 scopus 로고    scopus 로고
    • Nonrepudiable threshold proxy signatures with tracebility property
    • S. H. Nagore and M. R. Sekhar, "Nonrepudiable threshold proxy signatures with tracebility property," Far East Journal of Applied Mathematics, Vol. 6(3), pp. 233-240, 2002.
    • (2002) Far East Journal of Applied Mathematics , vol.6 , Issue.3 , pp. 233-240
    • Nagore, S.H.1    Sekhar, M.R.2
  • 12
    • 84956995852 scopus 로고    scopus 로고
    • A digital nominative proxy signature scheme for mobile communication
    • Proc. of ICICS 2001, International Conference on Information and Communications Security, Springer-Verlag
    • H. U. Park and I. Y. Lee, "A digital nominative proxy signature scheme for mobile communication," in the Proc. of ICICS 2001, International Conference on Information and Communications Security, Springer-Verlag, Lecture Notes in Computer Science 2229, pp.451-455, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2229 , pp. 451-455
    • Park, H.U.1    Lee, I.Y.2
  • 13
    • 12344258539 scopus 로고
    • Efficient signature generation by smart cards
    • C. Schnorr, "Efficient signature generation by smart cards," Journal of Cryptography 4(3), pp. 161-174, 1991.
    • (1991) Journal of Cryptography , vol.4 , Issue.3 , pp. 161-174
    • Schnorr, C.1
  • 14
    • 3042606448 scopus 로고    scopus 로고
    • New nominative proxy signature scheme for mobile communication
    • ISBN: 80-85960-50-8, pp
    • S. H Seo and S. H. Lee, "New nominative proxy signature scheme for mobile communication," in the Proc. of SPI'2003, Security and Protection of Information, ISBN: 80-85960-50-8, pp. 149-154, 2003.
    • (2003) Proc. of SPI'2003, Security and Protection of Information , pp. 149-154
    • Seo, S.H.1    Lee, S.H.2
  • 15
    • 0032670844 scopus 로고    scopus 로고
    • An efficient nonrepudiable threshold proxy signatures with known signers
    • H. M. Sun, "An efficient nonrepudiable threshold proxy signatures with known signers," Computer Communications 22(8), 1999, pp. 717-722.
    • (1999) Computer Communications , vol.22 , Issue.8 , pp. 717-722
    • Sun, H.M.1
  • 17
    • 26444601090 scopus 로고    scopus 로고
    • On the security of nominative signatures
    • Proc. Of Information Security and Privacy ACISP'05, Springer-Verlag
    • W. Susilo and Y. Mu, "On the security of nominative signatures," in the Proc. Of Information Security and Privacy (ACISP'05), LNCS 3547, pp. 329-335, Springer-Verlag, 2005.
    • (2005) LNCS , vol.3547 , pp. 329-335
    • Susilo, W.1    Mu, Y.2
  • 21
    • 1542335453 scopus 로고    scopus 로고
    • An improvement of nonrepudiable threshold proxy signature scheme with known signers
    • S. F. Tzeng, M. S. Hwang, and C. Y. Yang, "An improvement of nonrepudiable threshold proxy signature scheme with known signers," Computers and Security 23, 2004, pp. 174-178.
    • (2004) Computers and Security , vol.23 , pp. 174-178
    • Tzeng, S.F.1    Hwang, M.S.2    Yang, C.Y.3
  • 23
    • 13844266307 scopus 로고    scopus 로고
    • Comments on a threshold proxy signature scheme based on the RSA cryptosystem
    • October
    • G. Wang, F. Bao, J. Zhou, and R. H. Deng. "Comments on a threshold proxy signature scheme based on the RSA cryptosystem," IEEE Trans. On Knowledge and Data Engineering, Vol 16, No. 10, October 2004.
    • (2004) IEEE Trans. On Knowledge and Data Engineering , vol.16 , Issue.10
    • Wang, G.1    Bao, F.2    Zhou, J.3    Deng, R.H.4
  • 24
    • 33744898762 scopus 로고    scopus 로고
    • A threshold proxy signature scheme using self certified public keys
    • Parallel and Distributed Processing Applications: 2nd International Symposium ISPA 2004, Springer-Verlag
    • Q. S. Xue and Z. F. Cao, "A threshold proxy signature scheme using self certified public keys," Parallel and Distributed Processing Applications: 2nd International Symposium ISPA 2004, LNCS, Vol. 3358, pp. 715-724, Springer-Verlag 2004.
    • (2004) LNCS , vol.3358 , pp. 715-724
    • Xue, Q.S.1    Cao, Z.F.2
  • 25
    • 24644515598 scopus 로고    scopus 로고
    • On the efficiency of nonrepudiable threshold proxy signature scheme with known signers
    • C. Y. Yang, S. F. Tzeng and M. S. Hwang, "On the efficiency of nonrepudiable threshold proxy signature scheme with known signers," The Journal of Systems and Software 22(9), 2003, pp. 1-8.
    • (2003) The Journal of Systems and Software , vol.22 , Issue.9 , pp. 1-8
    • Yang, C.Y.1    Tzeng, S.F.2    Hwang, M.S.3
  • 26
    • 0000064722 scopus 로고    scopus 로고
    • Threshold proxy signature schemes
    • Japan, pp
    • K. Zhang, "Threshold proxy signature schemes," in the Proc of Information Security Workshop, Japan, pp. 191-197, 1997.
    • (1997) Proc of Information Security Workshop , pp. 191-197
    • Zhang, K.1
  • 27
    • 26044456799 scopus 로고    scopus 로고
    • An improved nominative proxy signature for mobile communication
    • July
    • K. Zhang, "An improved nominative proxy signature for mobile communication," IEICE Transactions on information and Systems, Vol. E88-D, No. 7, July 2005, pp. 1697-1699.
    • (2005) IEICE Transactions on information and Systems , vol.E88-D , Issue.7 , pp. 1697-1699
    • Zhang, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.