메뉴 건너뛰기




Volumn 31, Issue 2, 2009, Pages 348-353

An efficient anonymous proxy signature scheme with provable security

Author keywords

Bilinear pairings; Provable security; Proxy signature; Ring signature

Indexed keywords

APPLICATIONS.; BILINEAR PAIRINGS; PRIVACY PROTECTIONS; PROVABLE SECURITIES; PROVABLE SECURITY; PROVABLY SECURE; PROXY SIGNATURE; PROXY SIGNATURE SCHEMES; PROXY SIGNATURES; PROXY SIGNERS; RANDOM ORACLE MODELS; RING SIGNATURE; RING SIGNATURE SCHEMES; RING SIGNATURES; SECURITY ANALYSES;

EID: 55749099677     PISSN: 09205489     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.csi.2008.05.003     Document Type: Article
Times cited : (39)

References (24)
  • 1
    • 0030231965 scopus 로고    scopus 로고
    • Proxy signature: delegation of the power to sign messages
    • Mambo M., Usuda K., and Okamoto E. Proxy signature: delegation of the power to sign messages. IEICE Transactions on Fundamentals E79-A 9 (1996) 1338-1354
    • (1996) IEICE Transactions on Fundamentals , vol.E79-A , Issue.9 , pp. 1338-1354
    • Mambo, M.1    Usuda, K.2    Okamoto, E.3
  • 3
    • 84958751721 scopus 로고    scopus 로고
    • Secure mobile agent using strong non-designated proxy signature
    • Springer-Verlag
    • Lee B., Kim H., and Won K. Secure mobile agent using strong non-designated proxy signature. Proc. of ACISP2001, LNCS vol. 2119 (2001), Springer-Verlag 474-486
    • (2001) Proc. of ACISP2001, LNCS , vol.2119 , pp. 474-486
    • Lee, B.1    Kim, H.2    Won, K.3
  • 4
    • 0344512405 scopus 로고    scopus 로고
    • Generalization of proxy signature based on elliptic curves
    • Hwang M., Tzeng S., and Tsai C. Generalization of proxy signature based on elliptic curves. Computer Standards & Interfaces 26 (2004) 73-84
    • (2004) Computer Standards & Interfaces , vol.26 , pp. 73-84
    • Hwang, M.1    Tzeng, S.2    Tsai, C.3
  • 5
    • 33744908066 scopus 로고    scopus 로고
    • A short proxy signature scheme: efficient authentication in the ubiquitous world
    • Springer-Verlag
    • Huang X., Mu Y., Susili W., and Zhang F. A short proxy signature scheme: efficient authentication in the ubiquitous world. Proc. of EUC Workshops 2005, LNCS vol. 3823 (2005), Springer-Verlag 480-489
    • (2005) Proc. of EUC Workshops 2005, LNCS , vol.3823 , pp. 480-489
    • Huang, X.1    Mu, Y.2    Susili, W.3    Zhang, F.4
  • 6
    • 33751417424 scopus 로고    scopus 로고
    • A novel proxy key generation protocol and its application
    • Hu X., and Huang S. A novel proxy key generation protocol and its application. Computer Standards & Interfaces 29 (2007) 191-195
    • (2007) Computer Standards & Interfaces , vol.29 , pp. 191-195
    • Hu, X.1    Huang, S.2
  • 8
    • 0033875604 scopus 로고    scopus 로고
    • Proxy multi-signature scheme: a new type of proxy signature scheme
    • Yi L., Bai G., and Xiao G. Proxy multi-signature scheme: a new type of proxy signature scheme. Electronic Letters 36 6 (2000) 527-528
    • (2000) Electronic Letters , vol.36 , Issue.6 , pp. 527-528
    • Yi, L.1    Bai, G.2    Xiao, G.3
  • 10
    • 4043112629 scopus 로고    scopus 로고
    • Improvement of threshold proxy signature scheme
    • Shao Z. Improvement of threshold proxy signature scheme. Computer Standards & Interfaces 27 (2004) 53-59
    • (2004) Computer Standards & Interfaces , vol.27 , pp. 53-59
    • Shao, Z.1
  • 11
    • 54349105888 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of a threshold proxy signature scheme
    • 10.1016/j.csi.2007.11.002
    • Hu J., and Zhang J. Cryptanalysis and improvement of a threshold proxy signature scheme. Computer Standards & Interfaces (2008) 10.1016/j.csi.2007.11.002
    • (2008) Computer Standards & Interfaces
    • Hu, J.1    Zhang, J.2
  • 12
    • 54349116468 scopus 로고    scopus 로고
    • Secure multiple-times proxy signature scheme
    • 10.1016/j.csi.2007.10.005
    • Hong X., and Chen K. Secure multiple-times proxy signature scheme. Computer Standards & Interfaces (2007) 10.1016/j.csi.2007.10.005
    • (2007) Computer Standards & Interfaces
    • Hong, X.1    Chen, K.2
  • 14
    • 10644262979 scopus 로고    scopus 로고
    • The security of a strong proxy signature scheme with proxy signer privacy protection
    • Lee N., and Lee M. The security of a strong proxy signature scheme with proxy signer privacy protection. Applied Mathematics and Computation 161 (2005) 807-812
    • (2005) Applied Mathematics and Computation , vol.161 , pp. 807-812
    • Lee, N.1    Lee, M.2
  • 15
    • 55749109607 scopus 로고    scopus 로고
    • F. Zhang, R. Safavi-Naini, C. Lin, New proxy signature, proxy blind signature and proxy ring signature schemes from bilinear pairings, Cryptology eprint archive, 2003/104, 2003. http://eprint.iacr.org.
    • F. Zhang, R. Safavi-Naini, C. Lin, New proxy signature, proxy blind signature and proxy ring signature schemes from bilinear pairings, Cryptology eprint archive, 2003/104, 2003. http://eprint.iacr.org.
  • 16
    • 38349022736 scopus 로고    scopus 로고
    • Some new proxy signature schemes from bilinear pairings, progress on cryptography: 25 years of cryptography in China
    • Zhang F., Safavi-Naini R., and Lin C. Some new proxy signature schemes from bilinear pairings, progress on cryptography: 25 years of cryptography in China. Kluwer International Series in Engineering and Computer Science vol. 769 (2004) 59-66
    • (2004) Kluwer International Series in Engineering and Computer Science , vol.769 , pp. 59-66
    • Zhang, F.1    Safavi-Naini, R.2    Lin, C.3
  • 17
    • 84946840347 scopus 로고    scopus 로고
    • Short signature from the Weil pairing
    • Springer-Verlag
    • Boneh D., Lynn B., and Shacham H. Short signature from the Weil pairing. Proc. of Asiacrypt2001, LNCS vol. 2248 (2001), Springer-Verlag 514-532
    • (2001) Proc. of Asiacrypt2001, LNCS , vol.2248 , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 18
    • 21144441197 scopus 로고    scopus 로고
    • Aggregate and verifiably encrypted from bilinear maps
    • Springer-Verlag
    • Boneh D., Gentry G., Lynn B., and Shacham H. Aggregate and verifiably encrypted from bilinear maps. Proc. of Eurocrypt2003, LNCS vol. 2656 (2003), Springer-Verlag 272-293
    • (2003) Proc. of Eurocrypt2003, LNCS , vol.2656 , pp. 272-293
    • Boneh, D.1    Gentry, G.2    Lynn, B.3    Shacham, H.4
  • 19
    • 84958765355 scopus 로고    scopus 로고
    • ID-based blind signature and ring signature from pairings
    • Springer-Verlag
    • Zhang F., and Kim K. ID-based blind signature and ring signature from pairings. Proc of Asiacrypt02, LNCS vol. 2501 (2002), Springer-Verlag 533-547
    • (2002) Proc of Asiacrypt02, LNCS , vol.2501 , pp. 533-547
    • Zhang, F.1    Kim, K.2
  • 20
    • 0027726717 scopus 로고
    • Random oracles are practical: a paradigm for designing efficient protocols
    • ACM press, New York
    • Bellare M., and Rogaway P. Random oracles are practical: a paradigm for designing efficient protocols. Proc. of the 1st CCS (1993), ACM press, New York 62-73
    • (1993) Proc. of the 1st CCS , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 21
    • 0000901529 scopus 로고    scopus 로고
    • Security arguments for digital signature and blind signature
    • Pointcheval D., and Stern J. Security arguments for digital signature and blind signature. Journal of Cryptology 13 3 (2000) 361-396
    • (2000) Journal of Cryptology , vol.13 , Issue.3 , pp. 361-396
    • Pointcheval, D.1    Stern, J.2
  • 24
    • 55749096643 scopus 로고    scopus 로고
    • Secure proxy signature in the standard model
    • 10.1016/j.csi.2008.01.001
    • Cao F., and Cao Z. Secure proxy signature in the standard model. Computer Standards & Interfaces (2008) 10.1016/j.csi.2008.01.001
    • (2008) Computer Standards & Interfaces
    • Cao, F.1    Cao, Z.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.