메뉴 건너뛰기




Volumn 1, Issue , 2008, Pages 390-393

Efficient ID-based proxy blind signature schemes from pairings

Author keywords

[No Author keywords available]

Indexed keywords

BILINEAR PAIRINGS; BLIND SIGNATURES; ID-BASED; IDENTITY-BASED CRYPTOGRAPHIES; ORIGINAL SIGNERS; PROXY BLIND SIGNATURES; PROXY SIGNERS;

EID: 60349098767     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CIS.2008.101     Document Type: Conference Paper
Times cited : (9)

References (18)
  • 1
    • 85020598353 scopus 로고    scopus 로고
    • A. Shamir. Identity-based cryptosystems and signature schemes. In Advances in Cryptology - CRYPTO'84, LNCS 0196, pages 47-53. Springer-Verlag, 1984.
    • A. Shamir. Identity-based cryptosystems and signature schemes. In Advances in Cryptology - CRYPTO'84, LNCS 0196, pages 47-53. Springer-Verlag, 1984.
  • 2
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • J. Kilian, editor, Advances in Cryptology-CRYPTO 2001, Springer-Verlag
    • D. Boneh and M. Franklin. Identity-based encryption from the Weil pairing. In J. Kilian, editor, Advances in Cryptology-CRYPTO 2001, LNCS 2139, pages 213-229. Springer-Verlag, 2001.
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 3
    • 35248844436 scopus 로고    scopus 로고
    • An identity-based signature from gap Diffie-Hellman groups
    • Y. Desmedt, editor, Public Key Cryptography, PKC, of, Springer-Verlag
    • J.C. Cha and J.H. Cheon. An identity-based signature from gap Diffie-Hellman groups. In Y. Desmedt, editor, Public Key Cryptography - PKC 2003, volume 2567 of LNCS, pages 18-30. Springer-Verlag, 2002.
    • (2002) LNCS , vol.2567 , pp. 18-30
    • Cha, J.C.1    Cheon, J.H.2
  • 4
    • 35248867510 scopus 로고    scopus 로고
    • Efficient identity based signature schemes based on pairings
    • K. Nyberg and H. Heys, editors, Selected Areas in Cryptography 9th Annual International Workshop, SAC, of, Springer-Verlag
    • F. Hess. Efficient identity based signature schemes based on pairings. In K. Nyberg and H. Heys, editors, Selected Areas in Cryptography 9th Annual International Workshop, SAC 2002, volume 2595 of LNCS, pages 310-324. Springer-Verlag, 2003.
    • (2002) LNCS , vol.2595 , pp. 310-324
    • Hess, F.1
  • 5
    • 33646820668 scopus 로고    scopus 로고
    • P. S. L. M. Barreto, B. Libert, N. McCullagh, J. Quisquater, Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps. In B. Roy, editor(s), Asiacrypt 2005, LNCS 3788, pages 515-532, Springer-Verlag, 2005.
    • P. S. L. M. Barreto, B. Libert, N. McCullagh, J. Quisquater, Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps. In B. Roy, editor(s), Asiacrypt 2005, LNCS 3788, pages 515-532, Springer-Verlag, 2005.
  • 6
    • 63449088479 scopus 로고    scopus 로고
    • Efficient ID-based blind signature and proxy signature from bilinear pairings, ACISP 03
    • Springer-Verlag
    • F. Zhang and K. Kim, Efficient ID-based blind signature and proxy signature from bilinear pairings, ACISP 03, LNCS 2727, pages 312-323, Springer-Verlag, 2003.
    • (2003) LNCS , vol.2727 , pp. 312-323
    • Zhang, F.1    Kim, K.2
  • 7
    • 84958765355 scopus 로고    scopus 로고
    • ID-based blind signature and ring signature from pairings. Asiacrypt'2002
    • Springer-Verlag
    • F. Zhang, K. Kim, ID-based blind signature and ring signature from pairings. Asiacrypt'2002, LNCS 2501, pages 533-547, Springer-Verlag, 2002.
    • (2002) LNCS , vol.2501 , pp. 533-547
    • Zhang, F.1    Kim, K.2
  • 9
    • 60349123584 scopus 로고    scopus 로고
    • S. Kim, S. Park, and D. Won, Proxy signatures, revisited, In Pro. of ICICS'97, LNCS 1334, pages 223-232, Springer-Verlag, 1997.
    • S. Kim, S. Park, and D. Won, Proxy signatures, revisited, In Pro. of ICICS'97, LNCS 1334, pages 223-232, Springer-Verlag, 1997.
  • 10
    • 3142736051 scopus 로고    scopus 로고
    • A security personal learning tools using a proxy blind signature scheme
    • Illinois, USA, July, PP
    • WD. Lin and J.K. Jan, A security personal learning tools using a proxy blind signature scheme, In Proc. of International Conference on Chinese Language Computing, Illinois, USA, July 2000, PP. 273-277.
    • (2000) Proc. of International Conference on Chinese Language Computing , pp. 273-277
    • Lin, W.D.1    Jan, J.K.2
  • 11
    • 60349117953 scopus 로고    scopus 로고
    • Z. Tan, Z. Liu and C. Tang, Digital proxy blind signature schemes based on DLP and ECDLP, MM Research Preprints, No. 21, December 2002, MMRC, AMSS, Academia, Sinica, Beijing, pp. 212-217.
    • Z. Tan, Z. Liu and C. Tang, Digital proxy blind signature schemes based on DLP and ECDLP, MM Research Preprints, No. 21, December 2002, MMRC, AMSS, Academia, Sinica, Beijing, pp. 212-217.
  • 12
    • 14244269187 scopus 로고    scopus 로고
    • Proxy blind signature scheme, Cryptology ePrint Archive
    • Report 2003/072
    • S. Lal and A.K. Awasthi, Proxy blind signature scheme, Cryptology ePrint Archive, Report 2003/072.
    • Lal, S.1    Awasthi, A.K.2
  • 13
    • 26444570370 scopus 로고    scopus 로고
    • Provable Security of ID-based Proxy Signature Schemes
    • Proc. ICCNMC05, Springer-Verlag
    • C. Gu, Y Zhu. Provable Security of ID-based Proxy Signature Schemes. In Proc. ICCNMC05, LNCS 3619, pages 1277-1286, Springer-Verlag, 2005.
    • (2005) LNCS , vol.3619 , pp. 1277-1286
    • Gu, C.1    Zhu, Y.2
  • 14
    • 35048854587 scopus 로고    scopus 로고
    • An efficient signature scheme from bilinear pairings and its applications
    • PKC2004, Springer-Verlag
    • F. Zhang, R. Safavi-Naini, and W. Susilo. An efficient signature scheme from bilinear pairings and its applications. In PKC2004, LNCS 2947, pages 277-290. Springer-Verlag, 2004.
    • (2004) LNCS , vol.2947 , pp. 277-290
    • Zhang, F.1    Safavi-Naini, R.2    Susilo, W.3
  • 15
    • 33645585449 scopus 로고    scopus 로고
    • ID based cryptosystems with pairing on elliptic curve. Cryptology ePrint Archive
    • Report 2003/054
    • R. Sakai and M. Kasahara. ID based cryptosystems with pairing on elliptic curve. Cryptology ePrint Archive, Report 2003/054.
    • Sakai, R.1    Kasahara, M.2
  • 16
    • 23044517520 scopus 로고    scopus 로고
    • Efficient Scalar Multiplications on Elliptic Curves without Repeated Doublings and Their Practical Performance. ACISP 2000
    • Springer-Verlag
    • Y Sakai, K. Sakurai. Efficient Scalar Multiplications on Elliptic Curves without Repeated Doublings and Their Practical Performance. ACISP 2000, LNCS 1841, pp. 59-73. Springer-Verlag 2000.
    • (2000) LNCS , vol.1841 , pp. 59-73
    • Sakai, Y.1    Sakurai, K.2
  • 17
    • 0000901529 scopus 로고    scopus 로고
    • Security arguments for digital signatures and blind signatures
    • D. Pointcheval and J. Stern. Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13(3):361-369,2000.
    • (2000) Journal of Cryptology , vol.13 , Issue.3 , pp. 361-369
    • Pointcheval, D.1    Stern, J.2
  • 18
    • 60349126343 scopus 로고    scopus 로고
    • C. Gu and Y Zhu. An Efficient ID-based Proxy Signature Scheme from Pairings. Cryptology ePrint Archive, Report 2006/158, http://eprint.iacr.org/ 2006/158.
    • C. Gu and Y Zhu. An Efficient ID-based Proxy Signature Scheme from Pairings. Cryptology ePrint Archive, Report 2006/158, http://eprint.iacr.org/ 2006/158.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.