메뉴 건너뛰기




Volumn 179, Issue 24, 2009, Pages 4243-4248

Efficient threshold proxy signature protocol for mobile agents

Author keywords

Lagrange interpolation; Mobile agents; Proxy signature; RSA cryptosystem; Threshold proxy signature

Indexed keywords

DIGITAL SIGNATURE; EXECUTION ENVIRONMENTS; LAGRANGE FORMULA; LAGRANGE INTERPOLATION; NON-INTERACTIVE; PROXY SIGNATURE; PROXY SIGNATURES; PROXY SIGNER; REMOTE HOST; RSA CRYPTOSYSTEM; RSA CRYPTOSYSTEMS; SECRET INFORMATION; SIGNING KEY; SIMPLE ALGORITHM; THRESHOLD PROXY SIGNATURE; THRESHOLD PROXY SIGNATURES;

EID: 70349739583     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2009.08.010     Document Type: Article
Times cited : (19)

References (17)
  • 1
    • 55949088433 scopus 로고    scopus 로고
    • A secure identity-based proxy multi-signature scheme
    • Cao F., and Cao Z. A secure identity-based proxy multi-signature scheme. Information Sciences 179 (2009) 292-302
    • (2009) Information Sciences , vol.179 , pp. 292-302
    • Cao, F.1    Cao, Z.2
  • 2
    • 56649114655 scopus 로고    scopus 로고
    • An RSA-based (t, n) threshold proxy signature scheme with freewill identities
    • Chang Y., and Chang C. An RSA-based (t, n) threshold proxy signature scheme with freewill identities. International Journal of Information and Computer Security 1 1/2 (2007) 201-209
    • (2007) International Journal of Information and Computer Security , vol.1 , Issue.1-2 , pp. 201-209
    • Chang, Y.1    Chang, C.2
  • 3
    • 49849102704 scopus 로고    scopus 로고
    • Efficient generic on-line/off-line (threshold) signatures without key exposure
    • Chen X., Zhang F., Tian H., Wei B., Susilo W., Mu Y., Lee H., and Kim K. Efficient generic on-line/off-line (threshold) signatures without key exposure. Information Sciences 178 (2008) 4192-4203
    • (2008) Information Sciences , vol.178 , pp. 4192-4203
    • Chen, X.1    Zhang, F.2    Tian, H.3    Wei, B.4    Susilo, W.5    Mu, Y.6    Lee, H.7    Kim, K.8
  • 4
    • 84949751564 scopus 로고    scopus 로고
    • Security for Mobile Agents: Authentication and State Appraisal
    • W. Farmer, J. Gutmann and V. Swarup, in: Security for Mobile Agents: Authentication and State Appraisal, LNCS, vol. 1146, 1996, pp. 118-130.
    • (1996) LNCS , vol.1146 , pp. 118-130
    • Farmer, W.1    Gutmann, J.2    Swarup, V.3
  • 5
    • 0035451175 scopus 로고    scopus 로고
    • New nonrepudiable threshold proxy signature scheme with known signers
    • Hsu C., Wu T., and Wong D. New nonrepudiable threshold proxy signature scheme with known signers. Journal of Systems and Software 58 (2001) 119-124
    • (2001) Journal of Systems and Software , vol.58 , pp. 119-124
    • Hsu, C.1    Wu, T.2    Wong, D.3
  • 6
    • 33644688053 scopus 로고    scopus 로고
    • A novel efficient (t, n) threshold proxy signature scheme
    • Huang H., and Chang C. A novel efficient (t, n) threshold proxy signature scheme. Information Sciences 176 (2006) 1338-1349
    • (2006) Information Sciences , vol.176 , pp. 1338-1349
    • Huang, H.1    Chang, C.2
  • 7
    • 0242410360 scopus 로고    scopus 로고
    • A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem
    • Hwang M., Lu J., and Lin L. A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem. IEEE Transactions on Knowledge and data Engineering 15 6 (2003) 1552-1560
    • (2003) IEEE Transactions on Knowledge and data Engineering , vol.15 , Issue.6 , pp. 1552-1560
    • Hwang, M.1    Lu, J.2    Lin, L.3
  • 8
    • 0010567510 scopus 로고    scopus 로고
    • Proxy signatures, revisited
    • ICICS'97
    • S. Kim, S. Park, D. Won, Proxy signatures, revisited, in: ICICS'97, LNCS, vol 1334, 1997, pp. 223-232.
    • (1997) LNCS , vol.1334 , pp. 223-232
    • Kim, S.1    Park, S.2    Won, D.3
  • 10
    • 33646770684 scopus 로고    scopus 로고
    • A modified (t, n) threshold proxy signature scheme based on the RSA cryptosystem
    • W. Kuo, M. Chen, A modified (t, n) threshold proxy signature scheme based on the RSA cryptosystem, in: ICITA'05, 2005.
    • (2005) ICITA'05
    • Kuo, W.1    Chen, M.2
  • 11
    • 1642614187 scopus 로고    scopus 로고
    • Strong proxy signature and its applications
    • B. Lee, H. Kim, K. Kim, Strong proxy signature and its applications, In SCIS'01, vol. 2/2, 2001, pp. 603-608.
    • (2001) SCIS'01 , vol.2 , Issue.2 , pp. 603-608
    • Lee, B.1    Kim, H.2    Kim, K.3
  • 12
    • 84958751721 scopus 로고    scopus 로고
    • Secure mobile agent using strong non-designated proxy signature
    • ACISP '01
    • B. Lee, H. Kim, K. Kim, Secure mobile agent using strong non-designated proxy signature, in: ACISP '01, LNCS, vol. 2119, 2001, pp.474-486.
    • (2001) LNCS , vol.2119 , pp. 474-486
    • Lee, B.1    Kim, H.2    Kim, K.3
  • 13
    • 35748948981 scopus 로고    scopus 로고
    • New (t, n) threshold directed signature scheme with provable security
    • Lu R., Lin X., Cao Z., Shao J., and Liang X. New (t, n) threshold directed signature scheme with provable security. Information Sciences 178 (2008) 756-765
    • (2008) Information Sciences , vol.178 , pp. 756-765
    • Lu, R.1    Lin, X.2    Cao, Z.3    Shao, J.4    Liang, X.5
  • 14
    • 0030231965 scopus 로고    scopus 로고
    • Proxy signature: Delegation of the power to sign message
    • September
    • M. Mambo, K. Usuda, E. Okamoto, Proxy signature: delegation of the power to sign message, in: IEICE Transactions on Fundamentals, vol. E79-a, no. 9, September 1996, pp. 1338-1353.
    • (1996) IEICE Transactions on Fundamentals , vol.E79-a , Issue.9 , pp. 1338-1353
    • Mambo, M.1    Usuda, K.2    Okamoto, E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.