메뉴 건너뛰기




Volumn 35, Issue 1, 2009, Pages 86-95

A secure identity-based multi-proxy signature scheme

Author keywords

Digital signature; Identity based; Multi proxy signature; Provable security; Security model

Indexed keywords

ACCESS CONTROL; AUTHENTICATION; CRYPTOGRAPHY;

EID: 57849092101     PISSN: 00457906     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.compeleceng.2008.05.005     Document Type: Article
Times cited : (58)

References (17)
  • 1
    • 32544436746 scopus 로고    scopus 로고
    • Proxy blind signature scheme
    • Awasthi A.K., and Lal S. Proxy blind signature scheme. Trans Cryptol 2 1 (2005) 5-11
    • (2005) Trans Cryptol , vol.2 , Issue.1 , pp. 5-11
    • Awasthi, A.K.1    Lal, S.2
  • 2
    • 0037623983 scopus 로고    scopus 로고
    • Identity based encryption from the Weil pairing
    • Boneh D., and Franklin M.K. Identity based encryption from the Weil pairing. SIAM J Comput 32 3 (2003) 586-615
    • (2003) SIAM J Comput , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.K.2
  • 3
    • 35048876343 scopus 로고    scopus 로고
    • Security proofs for identity-based identification and signature schemes
    • Advances in cryptology - Eurocrypt 2004, Springer-Verlag
    • Bellare M., Namprempre C., and Neven G. Security proofs for identity-based identification and signature schemes. Advances in cryptology - Eurocrypt 2004. LNCS vol. 3027 (2004), Springer-Verlag 268-286
    • (2004) LNCS , vol.3027 , pp. 268-286
    • Bellare, M.1    Namprempre, C.2    Neven, G.3
  • 4
    • 57849110060 scopus 로고    scopus 로고
    • Boldyreva A, Palacio A, Warinschi B. Secure proxy signature schemes for delegation of signing rights. .
    • Boldyreva A, Palacio A, Warinschi B. Secure proxy signature schemes for delegation of signing rights. .
  • 5
    • 33644688053 scopus 로고    scopus 로고
    • A novel efficient (t, n) threshold proxy signature scheme
    • Huanga H., and Chang C. A novel efficient (t, n) threshold proxy signature scheme. Inform Sci 176 10 (2006) 1338-1349
    • (2006) Inform Sci , vol.176 , Issue.10 , pp. 1338-1349
    • Huanga, H.1    Chang, C.2
  • 6
    • 57849084531 scopus 로고    scopus 로고
    • Hwang S, Shi C. A simple multi-proxy signature scheme. In: Proceedings of the 10th national conference on information security, Hualien, Taiwan, ROC; 2000. p. 134-8.
    • Hwang S, Shi C. A simple multi-proxy signature scheme. In: Proceedings of the 10th national conference on information security, Hualien, Taiwan, ROC; 2000. p. 134-8.
  • 7
    • 0010567510 scopus 로고    scopus 로고
    • Proxy signatures, revisited
    • Proceedings of international conference on information and communications security (ICICS)'97. Han Y., Okamoto T., and Quing S. (Eds), Springer-Verlag
    • Kim S., Park S., and Won D. Proxy signatures, revisited. In: Han Y., Okamoto T., and Quing S. (Eds). Proceedings of international conference on information and communications security (ICICS)'97. LNCS vol. 1334 (1997), Springer-Verlag 223-232
    • (1997) LNCS , vol.1334 , pp. 223-232
    • Kim, S.1    Park, S.2    Won, D.3
  • 8
    • 27144534222 scopus 로고    scopus 로고
    • ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings
    • Li X., and Chen K. ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings. Appl Math Comput (2005)
    • (2005) Appl Math Comput
    • Li, X.1    Chen, K.2
  • 9
    • 13944264348 scopus 로고    scopus 로고
    • Multi-proxy signature and proxy multi-signature schemes from bilinear pairings
    • Proceedings of PDCAT 2004. Liew K.M., et al. (Ed), Springer-Verlag
    • Li X., Chen K., and Li S. Multi-proxy signature and proxy multi-signature schemes from bilinear pairings. In: Liew K.M., et al. (Ed). Proceedings of PDCAT 2004. LNCS vol. 3320 (2004), Springer-Verlag 591-595
    • (2004) LNCS , vol.3320 , pp. 591-595
    • Li, X.1    Chen, K.2    Li, S.3
  • 10
    • 35248866917 scopus 로고    scopus 로고
    • An analysis of proxy signatures: is a secure channel necessary?
    • Topics in cryptology-CT-RSA'03. Joye M. (Ed), Springer-Verlag
    • Lee J., Cheon J., and Kim S. An analysis of proxy signatures: is a secure channel necessary?. In: Joye M. (Ed). Topics in cryptology-CT-RSA'03. LNCS vol. 2612 (2003), Springer-Verlag 68-79
    • (2003) LNCS , vol.2612 , pp. 68-79
    • Lee, J.1    Cheon, J.2    Kim, S.3
  • 11
    • 57849168672 scopus 로고    scopus 로고
    • Lee B, Kim H, Kim K. Strong proxy signature and its applications. In: SCIS2001, vol. 2/2; January 23-26, 2001. p. 603-8.
    • Lee B, Kim H, Kim K. Strong proxy signature and its applications. In: SCIS2001, vol. 2/2; January 23-26, 2001. p. 603-8.
  • 12
    • 57849138619 scopus 로고    scopus 로고
    • Libert B, Quisquater JJ. The exact security of an identity based signature and its applications. .
    • Libert B, Quisquater JJ. The exact security of an identity based signature and its applications. .
  • 14
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Advances in cryptology - crypto 84, Springer-Verlag
    • Shamir A. Identity-based cryptosystems and signature schemes. Advances in cryptology - crypto 84. LNCS vol. 196 (1984), Springer-Verlag 47-53
    • (1984) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 15
    • 57849169118 scopus 로고    scopus 로고
    • Wang Q, Cao Z. Security arguments for partial delegation with warrant proxy signature schemes. .
    • Wang Q, Cao Z. Security arguments for partial delegation with warrant proxy signature schemes. .
  • 17
    • 57849105204 scopus 로고    scopus 로고
    • Xu J, Zhang Z, Feng D. ID-based proxy signature using bilinear pairings.
    • Xu J, Zhang Z, Feng D. ID-based proxy signature using bilinear pairings.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.