메뉴 건너뛰기




Volumn 85, Issue , 2004, Pages 38-43

Provably secure delegation-by-certification proxy signature schemes

Author keywords

Bilinear map; co GDH groups; Digital signature; Provably secure; Proxy signature

Indexed keywords

BILINEAR MAP; CERTIFICATE-BASED; CHOSEN MESSAGE ATTACKS; DIGITAL SIGNATURE; FORMAL SECURITY MODELS; PROVABLY SECURE; PROXY SIGNATURE SCHEME; PROXY SIGNATURES; RANDOM ORACLE MODEL; SECURITY REDUCTION; SIGNATURE SCHEME;

EID: 77952896675     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1046290.1046299     Document Type: Conference Paper
Times cited : (11)

References (20)
  • 1
    • 84946840347 scopus 로고    scopus 로고
    • Short Signatures from the Weil Pairiing
    • Proceedings of Asiacrypt 2001, Springer-Verlag
    • D.Boneh, B. Lynn and H. Shacham. Short Signatures from the Weil Pairiing. In Proceedings of Asiacrypt 2001, Lecture Notes in Computer Science, Springer-Verlag, Vol. 2248, pp. 514-532, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2248 , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 5
    • 84958968002 scopus 로고    scopus 로고
    • Secure transactions with mobile agent in hostile environments
    • Proc. ACISP 2000, Springer-Verlag
    • P. Kotzanikolaous, M.Burmester, and V. Chrisskopoulos. Secure transactions with mobile agent in hostile environments. In Proc. ACISP 2000, Lecture Notes in Computer Science 1841, Springer-Verlag, pp. 289-297, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1841 , pp. 289-297
    • Kotzanikolaous, P.1    Burmester, M.2    Chrisskopoulos, V.3
  • 9
    • 1642614187 scopus 로고    scopus 로고
    • Strong proxy signgture and its applications
    • B. Lee, H. Kim, and K. Kim. Strong proxy signgture and its applications. In Proceedings of SCIS, 2001, pp. 603-608.
    • (2001) Proceedings of SCIS , pp. 603-608
    • Lee, B.1    Kim, H.2    Kim, K.3
  • 10
    • 84958751721 scopus 로고    scopus 로고
    • Secure mobile agent using strong non-designated proxy signature
    • B. Lee, H. Kim, and K. Kim. Secure mobile agent using strong non-designated proxy signature. In Proc. ACISP 2001, pp. 474-486.
    • (2001) Proc. ACISP , pp. 474-486
    • Lee, B.1    Kim, H.2    Kim, K.3
  • 12
    • 84956995852 scopus 로고    scopus 로고
    • A digital nominative proxy signature scheme for mobile communications
    • ICICS 2001, Springer-Verlag
    • H.-U. Park and L.-Y. Lee. A digital nominative proxy signature scheme for mobile communications. ICICS 2001, Lecture Notes in Computer Science 2229, Springer-Verlag, pp. 451-455, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2229 , pp. 451-455
    • Park, H.-U.1    Lee, L.-Y.2
  • 13
    • 0032670844 scopus 로고    scopus 로고
    • An efficient nonrepudiable threshold proxy signatures with known signers
    • H. M. Sun. An efficient nonrepudiable threshold proxy signatures with known signers. Computer Communications 22(8),1999, pp. 717-722.
    • (1999) Computer Communications , vol.22 , Issue.8 , pp. 717-722
    • Sun, H.M.1
  • 17
    • 1642602942 scopus 로고    scopus 로고
    • Proxy blind signature scheme based on DLP
    • 2003
    • Z.-W.Tan, Z.-J. Liu. Proxy blind signature scheme based on DLP. Journal of Software, 2003/14, pp. 1931-1935, 2003.
    • (2003) Journal of Software , vol.14 , pp. 1931-1935
    • Tan, Z.-W.1    Liu, Z.-J.2
  • 19
    • 0345490608 scopus 로고    scopus 로고
    • Efficient One-time proxy signatures
    • Springer-Verlag
    • Huaxion Wang and Josef Pieprzyk. Efficient One-time proxy signatures. In ASIACRYPT 2003, pp. 507-522, 2004, Springer-Verlag.
    • ASIACRYPT 2003 , vol.2004 , pp. 507-522
    • Wang, H.1    Pieprzyk, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.