메뉴 건너뛰기




Volumn , Issue , 2004, Pages 494-497

Identity based proxy-signcryption scheme from pairings

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; ELECTRIC POWER DISTRIBUTION; ELECTRONIC COMMERCE; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; HEURISTIC METHODS; MOBILE TELECOMMUNICATION SYSTEMS; COMPUTER OPERATING SYSTEMS; PROBLEM SOLVING;

EID: 4644352655     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1016/j.ijrmms.2003.12.030     Document Type: Conference Paper
Times cited : (52)

References (15)
  • 1
    • 84958948780 scopus 로고    scopus 로고
    • A signcryption scheme with signature directly verifiable by public key
    • Springer-Verlag, LNCS 1431
    • F.Bao and R.H.Deng. A signcryption scheme with signature directly verifiable by public key. In PKC'98, pages 55-59. Springer-Verlag, LNCS 1431, 1998.
    • (1998) PKC'98 , pp. 55-59
    • Bao, F.1    Deng, R.H.2
  • 2
    • 1642407903 scopus 로고    scopus 로고
    • Efficient identity based signature schemes based on pairings
    • Lecture Notes in Computer Science. Springer-Verlag
    • F.Hess. Efficient identity based signature schemes based on pairings. Proceedings of 9th workshop on selected areas in cryplography-SAC2002. Lecture Notes in Computer Science. Springer-Verlag.
    • Proceedings of 9th Workshop on Selected Areas in Cryplography-SAC2002
    • Hess, F.1
  • 3
    • 0037974305 scopus 로고    scopus 로고
    • Exponent group signature schems and efficient identity based signature schemes based on pairings
    • Report 2002/012
    • F. Hess. Exponent group signature schems and efficient identity based signature schemes based on pairings. Cryptology ePrint Archive,Report 2002/012,2002.http://eprint.iacr.org/
    • (2002) Cryptology EPrint Archive
    • Hess, F.1
  • 4
    • 4644332974 scopus 로고    scopus 로고
    • Signcryption schemes with forward secrecy
    • H.Y. Jung,D.H.Lee,et al. Signcryption schemes with forward secrecy. WISA 2001,vol.2, pages 403-475, 2001.
    • (2001) WISA 2001 , vol.2 , pp. 403-475
    • Jung, H.Y.1    Lee, D.H.2
  • 6
    • 1642614187 scopus 로고    scopus 로고
    • Strong proxy signature and its applications
    • B.Lee,H.Kim,K.Kim. Strong proxy signature and its applications. Proc.of SCIS. pages 603-608, 2001.
    • (2001) Proc.of SCIS , pp. 603-608
    • Lee, B.1    Kim, H.2    Kim, K.3
  • 8
    • 0242445175 scopus 로고    scopus 로고
    • Identity-based signcryption
    • Report 2002/098
    • J.Malone-Lee. Identity-based signcryption. Cryptology ePrint Archive,Report 2002/098,http://eprint.iacr.org/
    • Cryptology EPrint Archive
    • Malone-Lee, J.1
  • 9
    • 0030231965 scopus 로고    scopus 로고
    • Proxy signature: Delegation of the power to sign messages
    • M.Mambo,K.Usuda,E.okamoto. Proxy signature: delegation of the power to sign messages. IEICE Trans.Fundamentals. E79-A:9, pages 1338-1353, 1996.
    • (1996) IEICE Trans.Fundamentals , vol.E79-A , Issue.9 , pp. 1338-1353
    • Mambo, M.1    Usuda, K.2    Okamoto, E.3
  • 11
    • 33645596850 scopus 로고    scopus 로고
    • Signcryption scheme for identity based cryptosystems
    • Report 2003/066
    • D.Nalla,K.C.Reddy. Signcryption scheme for identity based cryptosystems. Cryptology ePrint Archive,Report 2003/066,http://eprint.iacr.org/
    • Cryptology EPrint Archive
    • Nalla, D.1    Reddy, K.C.2
  • 12
    • 0037194815 scopus 로고    scopus 로고
    • ID-based signatures from pairings on elliptic curves
    • 38487, January
    • K.G. Paterson. ID-based signatures from pairings on elliptic curves. Electronics Letters. 38487, 1025-1020, January, 1999.
    • (1999) Electronics Letters , pp. 1025-11020
    • Paterson, K.G.1
  • 13
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • volume 196 of Lecture Notes in Computer Science, Springer-Verjag
    • A. Shamir. Identity-based cryptosystems and signature schemes. In Advances in Cryptology- CRYPTO'84, volume 196 of Lecture Notes in Computer Science, pages 47-53, Springer-Verjag, 1984.
    • (1984) Advances in Cryptology- CRYPTO'84 , pp. 47-53
    • Shamir, A.1
  • 14
    • 63449088479 scopus 로고    scopus 로고
    • Efficient ID-based blind signature and proxy signature from bilinear pairings
    • LNCS 2727
    • F.Zhang,K.Kim. Efficient ID-based blind signature and proxy signature from bilinear pairings. ACISP 2003, LNCS 2727, pages 312-323, 2003.
    • (2003) ACISP 2003 , pp. 312-323
    • Zhang, F.1    Kim, K.2
  • 15
    • 63449122349 scopus 로고    scopus 로고
    • Digital signcryption or how to achieve cost(signature & encryption)≪ cost(signature) + cost(encryption)
    • volume 1294 of Lecture Notes in Computer Science, Springer-Verlag
    • Y.Zheng. Digital signcryption or how to achieve cost(signature & encryption)≪ cost(signature) + cost(encryption). In Advances in Cryptology- CRYPTO'97, volume 1294 of Lecture Notes in Computer Science, pages 165-179,Springer-Verlag, 1997.
    • (1997) Advances in Cryptology- CRYPTO'97 , pp. 165-179
    • Zheng, Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.