메뉴 건너뛰기




Volumn 10, Issue 2, 2009, Pages 290-300

Self-certified multi-proxy signature schemes with message recovery

Author keywords

Discrete logarithms; Elliptic curve; Message recovery; Multi proxy signature; Self certified; Smart cards

Indexed keywords

ALGEBRA; CRYPTOGRAPHY; RECOVERY;

EID: 60349125224     PISSN: 1673565X     EISSN: 18621775     Source Type: Journal    
DOI: 10.1631/jzus.A0820202     Document Type: Article
Times cited : (16)

References (39)
  • 1
    • 60349106736 scopus 로고    scopus 로고
    • ANSI X9.31, 1998. Digital Signatures Using Reversible Public Key Cryptography for the Financial Services Industry (rDSA).
    • ANSI X9.31, 1998. Digital Signatures Using Reversible Public Key Cryptography for the Financial Services Industry (rDSA).
  • 2
    • 60349111550 scopus 로고    scopus 로고
    • ANSI X9.62, 1998. Public Key Cryptography for the Financial Service Industry-The Elliptic Curve Digital Signature Algorithm (ECDSA). Draft.
    • ANSI X9.62, 1998. Public Key Cryptography for the Financial Service Industry-The Elliptic Curve Digital Signature Algorithm (ECDSA). Draft.
  • 3
    • 60349126386 scopus 로고    scopus 로고
    • ANSI X9.63, 2001. Public Key Cryptography for the Financial Services Industry-Key Agreement and Key Transport Using Elliptic Curve Cryptography.
    • ANSI X9.63, 2001. Public Key Cryptography for the Financial Services Industry-Key Agreement and Key Transport Using Elliptic Curve Cryptography.
  • 4
    • 84957629783 scopus 로고    scopus 로고
    • Relations among notions of security for public-key encryption schemes
    • M. Bellare A. Desai D. Pointcheval P. Rogaway 1998 Relations among notions of security for public-key encryption schemes LNCS 1462 26 45
    • (1998) LNCS , vol.1462 , pp. 26-45
    • Bellare, M.1    Desai, A.2    Pointcheval, D.3    Rogaway, P.4
  • 6
    • 33746095782 scopus 로고    scopus 로고
    • VSH, an efficient and provable collision-resistant hash function
    • S. Contini A.K. Lenstra R. Steinfeld 2006 VSH, an efficient and provable collision-resistant hash function LNCS 4004 165 182
    • (2006) LNCS , vol.4004 , pp. 165-182
    • Contini, S.1    Lenstra, A.K.2    Steinfeld, R.3
  • 8
    • 85032883059 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • T. ElGamal 1985 A public key cryptosystem and a signature scheme based on discrete logarithms LNCS 196 10 18
    • (1985) LNCS , vol.196 , pp. 10-18
    • ElGamal, T.1
  • 9
    • 84937570422 scopus 로고
    • Self-certified public keys
    • M. Girault 1991 Self-certified public keys LNCS 547 490 497
    • (1991) LNCS , vol.547 , pp. 490-497
    • Girault, M.1
  • 10
    • 0035451175 scopus 로고    scopus 로고
    • New nonrepudiable threshold proxy signature scheme with known signers
    • 2
    • C.L. Hsu T.S. Wu T.C. Wu 2001 New nonrepudiable threshold proxy signature scheme with known signers J. Syst. Software 58 2 119 124
    • (2001) J. Syst. Software , vol.58 , pp. 119-124
    • Hsu, C.L.1    Wu, T.S.2    Wu, T.C.3
  • 11
    • 0141518230 scopus 로고    scopus 로고
    • A secure nonrepudiable threshold proxy signature scheme with known signers
    • 2
    • M.S. Hwang I.C. Lin J.L. Lu 2000 A secure nonrepudiable threshold proxy signature scheme with known signers Int. J. Inf. 11 2 1 8
    • (2000) Int. J. Inf. , vol.11 , pp. 1-8
    • Hwang, M.S.1    Lin, I.C.2    Lu, J.L.3
  • 14
    • 0008321437 scopus 로고    scopus 로고
    • IEEE P1363. The Institute of Electrical and Electronics Engineers, Inc. USA
    • IEEE P1363, 2000. Standard Specifications for Public Key Cryptography. The Institute of Electrical and Electronics Engineers, Inc., USA.
    • (2000) Standard Specifications for Public Key Cryptography
  • 15
    • 60349120135 scopus 로고    scopus 로고
    • ISO/IEC 9798-3, 1993. Information Technology-Security Techniques-Entity Authentication Mechanism-Part 3: Entity Authentication Using a Public Key Algorithm. International Organization for Standardization.
    • ISO/IEC 9798-3, 1993. Information Technology-Security Techniques-Entity Authentication Mechanism-Part 3: Entity Authentication Using a Public Key Algorithm. International Organization for Standardization.
  • 16
    • 60349096219 scopus 로고    scopus 로고
    • ISO/IEC 14888-3, 1998. Information Technology-Security Techniques-Digital Signature with Appendix-Part 3: Certificate-based Mechanisms. International Organization for Standardization.
    • ISO/IEC 14888-3, 1998. Information Technology-Security Techniques-Digital Signature with Appendix-Part 3: Certificate-based Mechanisms. International Organization for Standardization.
  • 17
    • 60349092591 scopus 로고    scopus 로고
    • ISO/IEC 15946-3, 2002. Information Technology-Security Techniques-Cryptographic Techniques Based on Elliptic Curves-Part 3: Key Establishment. International Organization for Standardization.
    • ISO/IEC 15946-3, 2002. Information Technology-Security Techniques-Cryptographic Techniques Based on Elliptic Curves-Part 3: Key Establishment. International Organization for Standardization.
  • 18
    • 0012497782 scopus 로고    scopus 로고
    • Elliptic curves and cryptography
    • 4
    • A. Jurisic A.J. Menezes 1997 Elliptic curves and cryptography Dr. Dobb's J. 22 4 26 35
    • (1997) Dr. Dobb's J. , vol.22 , pp. 26-35
    • Jurisic, A.1    Menezes, A.J.2
  • 20
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • 177
    • N. Koblitz 1987 Elliptic curve cryptosystems Math. Comput. 48 177 203 209
    • (1987) Math. Comput. , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 22
    • 0003777824 scopus 로고
    • Department of Electronic Engineering, Massachusetts Institute of Technology USA
    • Kohnfelder, L.M., 1978. Toward a Practical Public-key Cryptosystem. BS Thesis, Department of Electronic Engineering, Massachusetts Institute of Technology, USA.
    • (1978) Toward a Practical Public-key Cryptosystem
    • Kohnfelder, L.M.1
  • 23
    • 84956860632 scopus 로고    scopus 로고
    • On Zhang's nonrepudiable proxy signature schemes
    • N.Y. Lee T. Hwang C.H. Wang 1998 On Zhang's nonrepudiable proxy signature schemes LNCS 1438 415 422
    • (1998) LNCS , vol.1438 , pp. 415-422
    • Lee, N.Y.1    Hwang, T.2    Wang, C.H.3
  • 24
    • 33749071950 scopus 로고    scopus 로고
    • Multi-proxy Signature Schemes for Partial Delegation with Cheater Identification
    • IOS Press Amsterdam, Netherlands
    • Lin, C.Y., Wu, T.C., Hwang, J.J., 2002. Multi-proxy Signature Schemes for Partial Delegation with Cheater Identification. The Second Int. Workshop for Asia Public Key Infrastructure. IOS Press, Amsterdam, Netherlands, p.147-152.
    • (2002) The Second Int. Workshop for Asia Public Key Infrastructure , pp. 147-152
    • Lin, C.Y.1    Wu, T.C.2    Hwang, J.J.3
  • 29
    • 84955582446 scopus 로고    scopus 로고
    • On the risk of disruption in several multiparty signature schemes
    • M. Michels P. Horster 1996 On the risk of disruption in several multiparty signature schemes LNCS 1163 334 345
    • (1996) LNCS , vol.1163 , pp. 334-345
    • Michels, M.1    Horster, P.2
  • 30
    • 85015402934 scopus 로고
    • Use of elliptic curves in cryptography
    • V. Miller 1985 Use of elliptic curves in cryptography LNCS 218 417 426
    • (1985) LNCS , vol.218 , pp. 417-426
    • Miller, V.1
  • 31
    • 0027316628 scopus 로고
    • Proxy-based Authorization and Accounting for Distributed Systems [doi:10.1109/ICDCS.1993.287698]
    • Neuman, B.C., 1993. Proxy-based Authorization and Accounting for Distributed Systems. Proc. 13th Int. Conf. on Distributed Computing Systems, p.283-291. [doi:10.1109/ICDCS.1993.287698]
    • (1993) Proc. 13th Int. Conf. on Distributed Computing Systems , pp. 283-291
    • Neuman, B.C.1
  • 32
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • A. Shamir 1984 Identity-based cryptosystems and signature schemes LNCS 196 47 53
    • (1984) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 35
    • 2942594446 scopus 로고    scopus 로고
    • A nonrepudiable threshold multi-proxy multisignature scheme with shared verification
    • 5
    • S.F. Tzeng C.Y. Yang M.S. Hwang 2004 A nonrepudiable threshold multi-proxy multisignature scheme with shared verification Fut. Gen. Comput. Syst. 20 5 887 893
    • (2004) Fut. Gen. Comput. Syst. , vol.20 , pp. 887-893
    • Tzeng, S.F.1    Yang, C.Y.2    Hwang, M.S.3
  • 39
    • 0033875604 scopus 로고    scopus 로고
    • Proxy multi-signature scheme: a new type of proxy signature scheme
    • 6
    • L.J. Yi G.Q. Bai G.Z. Xiao 2000 Proxy multi-signature scheme: a new type of proxy signature scheme Electron. Lett. 36 6 527 528
    • (2000) Electron. Lett. , vol.36 , pp. 527-528
    • Yi, L.J.1    Bai, G.Q.2    Xiao, G.Z.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.