메뉴 건너뛰기




Volumn 3, Issue , 2008, Pages 17-22

Design of proxy signature in ECDSA

Author keywords

Cryptography; DSA; ECDSA; Proxy protected signature; Signature

Indexed keywords

BASIC PROPERTIES; DSA; ECDSA; PARTIAL DELEGATION; PROXY SIGNATURE SCHEME; PROXY SIGNATURES; PROXY-PROTECTED SIGNATURE; PROXY-PROTECTED SIGNATURES; SECURITY WEAKNESS; SIGNATURE;

EID: 67549144267     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISDA.2008.53     Document Type: Conference Paper
Times cited : (7)

References (12)
  • 1
    • 0030231965 scopus 로고    scopus 로고
    • Proxy signatures: Delegation of the power to sign messages
    • M. Mambo, K. Usuda, and E. Okamoto, "Proxy signatures: Delegation of the power to sign messages, " IEICE Trans. Fundamentals, vol. E79-A, no.9, pp.1338- 1354, 1996
    • (1996) IEICE Trans. Fundamentals , vol.E79-A , Issue.9 , pp. 1338-1354
    • Mambo, M.1    Usuda, K.2    Okamoto, E.3
  • 2
    • 29144491321 scopus 로고    scopus 로고
    • Strong proxy signatures
    • Jan
    • B. Lee, and K. Kim, "Strong proxy signatures,- IEICE Trans. Fundamentals, vol. E82-A, no.1, pp.1-11, Jan 1999
    • (1999) IEICE Trans. Fundamentals , vol.E82-A , Issue.1 , pp. 1-11
    • Lee, B.1    Kim, K.2
  • 3
    • 1642614187 scopus 로고    scopus 로고
    • Strong proxy signature and its applications
    • B. Lee, H. Kim and K. Kim, "Strong proxy signature and its applications," Proc. of SCIS 2001, 11B-1, pp. 603-608, 2001.
    • (2001) Proc. of SCIS 2001, 11B-1 , pp. 603-608
    • Lee, B.1    Kim, H.2    Kim, K.3
  • 4
    • 0010567510 scopus 로고    scopus 로고
    • Proxy signatures, Revisited
    • Proc. of ICICS-97, Springer-Verlag
    • S. Kim, S. Park, and D. Won, "Proxy signatures, Revisited," Proc. of ICICS-97, Springer-Verlag, LNCS 1334, pp. 223-232, 1997.
    • (1997) LNCS , vol.1334 , pp. 223-232
    • Kim, S.1    Park, S.2    Won, D.3
  • 6
    • 0344512405 scopus 로고    scopus 로고
    • Min-Shiang Hwang, Shiang-Feng Tzeng, and Chwei- Shyong Tsai, Generalization of proxy signature based on elliptic curves, Computer Standards & Interfaces, March 2004, 26 pp.73-84.
    • Min-Shiang Hwang, Shiang-Feng Tzeng, and Chwei- Shyong Tsai, "Generalization of proxy signature based on elliptic curves," Computer Standards & Interfaces, March 2004, vol.26 pp.73-84.
  • 7
    • 67549090715 scopus 로고    scopus 로고
    • Wei-Bin Lee and Tzung-Her Chen, -Constructing a proxy signature scheme based on existing security mechanisms,- Information& Security, an International Journal 12, No. 2 2003 pp.250-258.
    • Wei-Bin Lee and Tzung-Her Chen, -Constructing a proxy signature scheme based on existing security mechanisms,- Information& Security, an International Journal vol 12, No. 2 2003 pp.250-258.
  • 8
    • 67549088979 scopus 로고    scopus 로고
    • NIST. Digital Signature Standard (DSS). Federal Information Processing Standards Publication 186, November 1994. Revision (To include ECDSA) 186- 2, January 2000. http://csrc.nist.gov/cryptval/dss.htm
    • NIST. Digital Signature Standard (DSS). Federal Information Processing Standards Publication 186, November 1994. Revision (To include ECDSA) 186- 2, January 2000. http://csrc.nist.gov/cryptval/dss.htm
  • 10
    • 67549120244 scopus 로고    scopus 로고
    • Standard specifications for public-key cryptography,- Draft version D22,
    • IEEE P1363, November 2
    • IEEE P1363,-Standard specifications for public-key cryptography,- Draft version D22, November 2, 2005.
    • (2005)
  • 12
    • 33746909479 scopus 로고    scopus 로고
    • Ming-Hsin Chang, and Yi-Shiung Yeh Signature Algorithm (DSA)
    • July
    • I-Te Chen, Ming-Hsin Chang, and Yi-Shiung Yeh Signature Algorithm (DSA),- Journal of Information Science and Engineering, Vol. 22 No. 4, pp. 965-973, July 2006.
    • (2006) Journal of Information Science and Engineering , vol.22 , Issue.4 , pp. 965-973
    • Chen, I.-T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.