메뉴 건너뛰기




Volumn 31, Issue 1, 2009, Pages 19-23

Secure multiple-times proxy signature scheme

Author keywords

Binary hash tree; Multiple times proxy signature scheme; Proxy signature scheme; Restriction

Indexed keywords

INTELLIGENT AGENTS;

EID: 54349116468     PISSN: 09205489     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.csi.2007.10.005     Document Type: Article
Times cited : (8)

References (14)
  • 1
    • 0242372947 scopus 로고    scopus 로고
    • Proxy and threshold one-time signatures
    • Al-Ibrahim M., and Cerny A. Proxy and threshold one-time signatures. ACNS 2003, LNCS 2846 (2003) 123-126
    • (2003) ACNS 2003, LNCS 2846 , pp. 123-126
    • Al-Ibrahim, M.1    Cerny, A.2
  • 3
    • 84991872092 scopus 로고    scopus 로고
    • Schnorr signature scheme with restricted signing capability and its application
    • Choi C., Kim Z., and Kim K. Schnorr signature scheme with restricted signing capability and its application. Proc. of CSS'03 (2003)
    • (2003) Proc. of CSS'03
    • Choi, C.1    Kim, Z.2    Kim, K.3
  • 4
    • 84949751564 scopus 로고    scopus 로고
    • Security for mobile agents: authentication and state appraisal
    • Farmer W., Gutmann J., and Swarup V. Security for mobile agents: authentication and state appraisal. LNCS vol. 1146 (1996) 118-130
    • (1996) LNCS , vol.1146 , pp. 118-130
    • Farmer, W.1    Gutmann, J.2    Swarup, V.3
  • 5
    • 21644483944 scopus 로고    scopus 로고
    • Digital signature schemes with restriction on signing capability
    • Hwang J., Kim H., Lee D., and Lim J. Digital signature schemes with restriction on signing capability. Proc. of ACISP 2003, LNCS vol. 2727 (2003) 324-335
    • (2003) Proc. of ACISP 2003, LNCS , vol.2727 , pp. 324-335
    • Hwang, J.1    Kim, H.2    Lee, D.3    Lim, J.4
  • 9
    • 84958751721 scopus 로고    scopus 로고
    • Secure mobile agent using strong non-designated proxy signature
    • Lee B., Kim H., and Kim K. Secure mobile agent using strong non-designated proxy signature. ACISP '01, LNCS vol. 2119 (2001) 474-486
    • (2001) ACISP '01, LNCS , vol.2119 , pp. 474-486
    • Lee, B.1    Kim, H.2    Kim, K.3
  • 10
    • 54349106469 scopus 로고    scopus 로고
    • Security analysis and improvement of some proxy signature schemes
    • Li J., Zhang Y., and Zhu Y. Security analysis and improvement of some proxy signature schemes. Inn Conference '04 (Month 1-2, 2004)
    • (2004) Inn Conference '04
    • Li, J.1    Zhang, Y.2    Zhu, Y.3
  • 12
    • 54349122654 scopus 로고    scopus 로고
    • Provably Secure Delegation-by-certification Proxy Signature Scheme
    • Tan Z., and Liu Z. Provably Secure Delegation-by-certification Proxy Signature Scheme. INFOSECU'04 (2004)
    • (2004) INFOSECU'04
    • Tan, Z.1    Liu, Z.2
  • 13
    • 26444516527 scopus 로고    scopus 로고
    • A novel and secure non-designated proxy signature scheme for mobile agents
    • Zhang J., Zou J., and Wang Y. A novel and secure non-designated proxy signature scheme for mobile agents. ICCNMC 2005, LNCS vol. 3619 (2005) 836-844
    • (2005) ICCNMC 2005, LNCS , vol.3619 , pp. 836-844
    • Zhang, J.1    Zou, J.2    Wang, Y.3
  • 14
    • 33646675362 scopus 로고    scopus 로고
    • An efficient proxy-protected signature scheme based on factoring
    • Zhou Y., Cao Z., and Chai Z. An efficient proxy-protected signature scheme based on factoring. ISPA workshops 2005, LNCS vol. 3759 (2005) 332-341
    • (2005) ISPA workshops 2005, LNCS , vol.3759 , pp. 332-341
    • Zhou, Y.1    Cao, Z.2    Chai, Z.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.