메뉴 건너뛰기




Volumn 4, Issue 2, 2008, Pages 425-431

Robust T-out-of-N proxy signature based on rsa cryptosystems

Author keywords

(t, n) Ihreshold; Cryptography; Froxy signature; KoA

Indexed keywords


EID: 63649101521     PISSN: 13494198     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (23)

References (24)
  • 1
    • 0242410360 scopus 로고    scopus 로고
    • A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem
    • M. S. Hwang, J. L. Lu and I. C. Lin, A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem, IEEE Transactions on Knowledge and Data Engineering, vol. 15, no.6, pp.1552-1560, 2003.
    • (2003) IEEE Transactions on Knowledge and Data Engineering , vol.15 , Issue.6 , pp. 1552-1560
    • Hwang, M.S.1    Lu, J.L.2    Lin, I.C.3
  • 2
    • 13844266307 scopus 로고    scopus 로고
    • Comments on a practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem
    • G. Wang, F. Bao, J. Zhou and R. H. Deng, Comments on a practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem, IEEE Transactions on Knowledge and Data Engineering, vol.16, no.10, pp.1309-1311, 2004.
    • (2004) IEEE Transactions on Knowledge and Data Engineering , vol.16 , Issue.10 , pp. 1309-1311
    • Wang, G.1    Bao, F.2    Zhou, J.3    Deng, R.H.4
  • 3
    • 0030231965 scopus 로고    scopus 로고
    • Proxy signature: Delegation of the power to sign messages
    • M. Mombo, K. Usuda and E. Okamoto, Proxy signature: delegation of the power to sign messages, IEICE Transactions on FundamentaL, vol.E79-A, no.9, pp. 1338-1353, 1996.
    • (1996) IEICE Transactions on FundamentaL , vol.E79-A , Issue.9 , pp. 1338-1353
    • Mombo, M.1    Usuda, K.2    Okamoto, E.3
  • 4
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, How to share a secret, Communications of the ACM, vol.22, no.ll, pp.612-613, 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.LL , pp. 612-613
    • Shamir, A.1
  • 5
    • 84876222959 scopus 로고
    • Distributed provers with applications to undeniable signatures
    • Brighton, England, pp
    • T. P. Pedersen, Distributed provers with applications to undeniable signatures, Proc. of the EURO- CRYPT'91, Brighton, England, pp.221-242, 1991.
    • (1991) Proc. of the EURO- CRYPT'91 , pp. 221-242
    • Pedersen, T.P.1
  • 6
    • 85030460443 scopus 로고    scopus 로고
    • T. P. Pedersen, A threshold cryptosystem without a trusted party, Proc. of the EUROCRYPT'91, Brighton, England, pp.522-526, 1991.
    • T. P. Pedersen, A threshold cryptosystem without a trusted party, Proc. of the EUROCRYPT'91, Brighton, England, pp.522-526, 1991.
  • 7
    • 0000064722 scopus 로고    scopus 로고
    • Threshold proxy signature schemes
    • California, USA, pp
    • K. Zhang, Threshold proxy signature schemes, Proc. of the Information Security Workshop, California, USA, pp.282-290, 1997.
    • (1997) Proc. of the Information Security Workshop , pp. 282-290
    • Zhang, K.1
  • 9
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. L. Rivest, A. Shamir and L. M. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, no.2, pp.120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 10
    • 0032670844 scopus 로고    scopus 로고
    • An efficient nonrepudiable threshold proxy signature scheme with known signers
    • H. M. Sun, An efficient nonrepudiable threshold proxy signature scheme with known signers, Computer Communications, vol.22, no.8, pp.717-722, 1999.
    • (1999) Computer Communications , vol.22 , Issue.8 , pp. 717-722
    • Sun, H.M.1
  • 12
    • 0141518230 scopus 로고    scopus 로고
    • A secure nonrepudiable threshold proxy signature scheme with known signers
    • M. S. Hwang, I. C. Lin and J. L. Lu, A secure nonrepudiable threshold proxy signature scheme with known signers, Informatica, vol.11, no.2, pp.1-8, 2000.
    • (2000) Informatica , vol.11 , Issue.2 , pp. 1-8
    • Hwang, M.S.1    Lin, I.C.2    Lu, J.L.3
  • 13
    • 0035451175 scopus 로고    scopus 로고
    • New nonrepudiable threshold proxy signature scheme with known signers
    • C. L. Hsu, T. S. Wu and T. C. Wu, New nonrepudiable threshold proxy signature scheme with known signers, The Journal of Systems and Software, vol.58, no.5, pp.119-124, 2001.
    • (2001) The Journal of Systems and Software , vol.58 , Issue.5 , pp. 119-124
    • Hsu, C.L.1    Wu, T.S.2    Wu, T.C.3
  • 15
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • T. ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transactions on Information Theory, vol.31, no.4, pp.469-472, 1985.
    • (1985) IEEE Transactions on Information Theory , vol.31 , Issue.4 , pp. 469-472
    • ElGamal, T.1
  • 16
    • 12344258539 scopus 로고
    • Efficient signature generation by smart cards
    • C. Schnorr, Efficient signature generation by smart cards, Cryptology, vol.4, no.3, pp.161-174, 1991.
    • (1991) Cryptology , vol.4 , Issue.3 , pp. 161-174
    • Schnorr, C.1
  • 17
    • 56649114655 scopus 로고    scopus 로고
    • An RSA-based (í, n) threshold proxy signature scheme with free-will identities
    • Y. F. Chang and C. C. Chang, An RSA-based (í, n) threshold proxy signature scheme with free-will identities, International Journal of Information and Computer Security, vol.l, no.1/2, pp.201-209, 2007
    • (2007) International Journal of Information and Computer Security , vol.50 , Issue.1-2 , pp. 201-209
    • Chang, Y.F.1    Chang, C.C.2
  • 18
    • 0242582261 scopus 로고    scopus 로고
    • An efficient and practical (t, n) threshold proxy signature scheme with known signers
    • H. F. Huang and C. C. Chang, An efficient and practical (t, n) threshold proxy signature scheme with known signers, Fundamenta Informaticae, vol.56, no.3, pp.243-253, 2003.
    • (2003) Fundamenta Informaticae , vol.56 , Issue.3 , pp. 243-253
    • Huang, H.F.1    Chang, C.C.2
  • 19
    • 21644442588 scopus 로고    scopus 로고
    • Efficient one-time proxy signatures
    • M. Mehta and L. Ham, Efficient one-time proxy signatures, IEE Proceedings of Communications, vol.152, no.2, pp.129-133, 2005.
    • (2005) IEE Proceedings of Communications , vol.152 , Issue.2 , pp. 129-133
    • Mehta, M.1    Ham, L.2
  • 20
    • 84958744427 scopus 로고    scopus 로고
    • 1-out-of-n signatures from variety of keys
    • Queenstown, New Zealand
    • M. Abe, M. Ohkubo and K. Suzuki, 1-out-of-n signatures from variety of keys, Proc. of the ASI- ACRYPT 2002, Queenstown, New Zealand, vol.2501, pp.415-432, 2002.
    • (2002) Proc. of the ASI- ACRYPT 2002 , vol.2501 , pp. 415-432
    • Abe, M.1    Ohkubo, M.2    Suzuki, K.3
  • 22
    • 48249121784 scopus 로고    scopus 로고
    • Collision detection and estimation of its spot for a flexible beam using ratio of mode functions
    • Y. Sawada and T. Sako, Collision detection and estimation of its spot for a flexible beam using ratio of mode functions, International Journal of Innovative Computing, Information and Control, vol.2, no.5, pp.1027-1038, 2005.
    • (2005) International Journal of Innovative Computing, Information and Control , vol.2 , Issue.5 , pp. 1027-1038
    • Sawada, Y.1    Sako, T.2
  • 24
    • 48249127045 scopus 로고    scopus 로고
    • L. Mi and F. Takeda, Analysis on the Robustness of the pressure-based individual identification system based on neural networks, International Journal of Innovative Computing, Information and Control, 3, no.l, pp.97-110, 2007.
    • L. Mi and F. Takeda, Analysis on the Robustness of the pressure-based individual identification system based on neural networks, International Journal of Innovative Computing, Information and Control, vol.3, no.l, pp.97-110, 2007.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.