메뉴 건너뛰기




Volumn 27, Issue 4, 2011, Pages 1249-1264

Another efficient proxy signature scheme in the standard model

Author keywords

Mobile agent; Proxy signature; Security proof; Standard model; The k + 1 square roots problem

Indexed keywords

COMPUTATIONAL COSTS; ORIGINAL SIGNERS; PROXY SIGNATURE SCHEME; PROXY SIGNATURES; PROXY SIGNER; PUBLIC KEYS; SECURITY PROOFS; SIGNATURE SCHEME; STANDARD MODEL; THE K + 1-SQUARE ROOTS PROBLEM; THE STANDARD MODEL; WITHOUT RANDOM ORACLE MODEL;

EID: 80051478463     PISSN: 10162364     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (12)

References (25)
  • 2
    • 33646690058 scopus 로고    scopus 로고
    • ID-based proxy signature using bilinear pairings
    • Proceedings of Parallel and Distributed Processing and Applications
    • J. XU, Z. Zhang, and D. Feng, "ID-based proxy signature using bilinear pairings," in Proceedings of Parallel and Distributed Processing and Applications, LNCS 3559, 2005, pp. 359-367.
    • (2005) LNCS , vol.3559 , pp. 359-367
    • Xu, J.1    Zhang, Z.2    Feng, D.3
  • 3
    • 35048832490 scopus 로고    scopus 로고
    • An un-instantiable random-oracle-model scheme for a hy brid-encryption problem
    • Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques
    • M. Bellare, A. Boldyreva, and A. Palacio, "An un-instantiable random-oracle-model scheme for a hy brid-encryption problem," in Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 3027, 2004, pp. 171-188.
    • (2004) LNCS , vol.3027 , pp. 171-188
    • Bellare, M.1    Boldyreva, A.2    Palacio, A.3
  • 5
    • 84937420653 scopus 로고    scopus 로고
    • Separating random oracle proofs from complexity theoretic proofs: The non-committing encryption case
    • Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
    • J. Nielsen, "Separating random oracle proofs from complexity theoretic proofs: The non-committing encryption case," in Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology, LNCS 2442, 2002, pp. 111-126.
    • (2002) LNCS , vol.2442 , pp. 111-126
    • Nielsen, J.1
  • 6
    • 63449088479 scopus 로고    scopus 로고
    • Efficient ID-based blind signature and proxy signature from pairings
    • Proceedings of the 8th Australasian Conference on Information Security and Privacy
    • F. Zhang and K. Kim, "Efficient ID-based blind signature and proxy signature from pairings," in Proceedings of the 8th Australasian Conference on Information Security and Privacy, LNCS 2727, 2003, pp. 312-323.
    • (2003) LNCS , vol.2727 , pp. 312-323
    • Zhang, F.1    Kim, K.2
  • 7
    • 35048854587 scopus 로고    scopus 로고
    • An efficient signature scheme from bilinear pairings and its application
    • Proceedings of International Workshop on Practice and Theory in Public Key Cryptography
    • F. Zhang, R. Safavi-Naini, and W. Susilo, "An efficient signature schem e from bilinear pairings and its application," in Proceedings of International Workshop on Practice and Theory in Public Key Cryptography, LNCS 2947, 2004, pp. 277-290.
    • (2004) LNCS , vol.2947 , pp. 277-290
    • Zhang, F.1    Safavi-Naini, R.2    Susilo, W.3
  • 8
    • 84973533953 scopus 로고    scopus 로고
    • An identity-based proxy signature scheme from pairings
    • Proceedings of International Conference on Information and Communications Security
    • K. Shim, "An identity-based proxy signature scheme from pairings," in Proceedings of International Conference on Information and Communications Security, LNCS 4307, 2006, pp. 60-71.
    • (2006) LNCS , vol.4307 , pp. 60-71
    • Shim, K.1
  • 9
    • 11244339991 scopus 로고    scopus 로고
    • Secure proxy signature scheme for delegation of signing rights
    • A. Boldyreva, A. Palacio, and B. W arinschi, "Secure proxy signature scheme for delegation of signing rights," IACR ePrint Archive, http://eprint.iacr.org/2003/096.
    • IACR EPrint Archive
    • Boldyreva, A.1    Palacio, A.2    Arinschi, B.W.3
  • 10
    • 84880373553 scopus 로고    scopus 로고
    • Proxy signature without random oracles
    • Proceedings of the 2nd International Conference on Mobile Ad-hoc and Sensor Networks
    • X. Huang, W. Susilo, Y. M u, and W. Wu, "Proxy signature without random oracles," in Proceedings of the 2nd International Conference on Mobile Ad-hoc and Sensor Networks, LNCS 4325, 2006, pp. 473-484.
    • (2006) LNCS , vol.4325 , pp. 473-484
    • Huang, X.1    Susilo, W.2    Mu, Y.3    Wu, W.4
  • 11
    • 38049022497 scopus 로고    scopus 로고
    • Identity-based proxy signature from pairings
    • Proceedings of the 4th International Conference on Autonomic and Trusted Computing
    • W. Wu, Y. Mu, W. Susilo, J. Seberry, and X. Huang, "Identity-based proxy signature from pairings," in Proceedings of the 4th International Conference on Autonomic and Trusted Computing, LNCS 4610, 2007, pp. 22-31.
    • (2007) LNCS , vol.4610 , pp. 22-31
    • Wu, W.1    Mu, Y.2    Susilo, W.3    Seberry, J.4    Huang, X.5
  • 12
    • 0023985465 scopus 로고    scopus 로고
    • A digital signature scheme secure against adaptively chosen message attacks
    • S. Goldwasser, S. Micali, and R. Rivest, "A digital signature scheme secure against adaptively chosen message attacks," SIAM Journal on Computing, Vol. 17, 1998, pp. 281-308.
    • (1998) SIAM Journal on Computing , vol.17 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 16
    • 84956995852 scopus 로고    scopus 로고
    • A digital nominative proxy signature scheme for mobile communications
    • Proceedings of the 3rd International Conference on Information and Communications Security
    • H. U. Park and L. Y. Lee, "A digital nominative proxy signature scheme for mobile communications," in Proceedings of the 3rd International Conference on Information and Communications Security, LNCS 2229, 2001, pp. 451-455.
    • (2001) LNCS , vol.2229 , pp. 451-455
    • Park, H.U.1    Lee, L.Y.2
  • 18
    • 67349237088 scopus 로고    scopus 로고
    • Cryptanalysis and im provement of an ID-based ad-hoc anonymous identification scheme at C T-RSA 05
    • F. Zhang and X. Chen, "Cryptanalysis and im provement of an ID-based ad-hoc anonymous identification scheme at C T-RSA 05," Information Processing Letters, Vol. 109, 2009, pp. 846-849.
    • (2009) Information Processing Letters , vol.109 , pp. 846-849
    • Zhang, F.1    Chen, X.2
  • 19
    • 84927727752 scopus 로고    scopus 로고
    • Security proofs for signature schemes
    • Proceedings of International Conference on the Theory and Application of Cryptographic Techniques Saragossa
    • D. Pointcheval and J. Stern, "Security proofs for signature schemes," in Proceedings of International Conference on the Theory and Application of Cryptographic Techniques Saragossa, LNCS 1070, 1996, pp. 387-398.
    • (1996) LNCS , vol.1070 , pp. 387-398
    • Pointcheval, D.1    Stern, J.2
  • 22
    • 84958751721 scopus 로고    scopus 로고
    • Secure mobile agent using strong non-designated proxy signature
    • Proceedings of the 6th Australasian Conference on Information Security and Privacy
    • B. Lee, H. Kim, and K. Kim, "Secure mobile agent using strong non-designated proxy signature," in Proceedings of the 6th Australasian Conference on Information Security and Privacy, LNCS 2119, 2001, pp. 474-486.
    • (2001) LNCS , vol.2119 , pp. 474-486
    • Lee, B.1    Kim, H.2    Kim, K.3
  • 23
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Proceedings of the 21st Annual International Cryptology Conference
    • D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing," in Proceedings of the 21st Annual International Cryptology Conference, LNCS 2139, 2001, pp. 213-229.
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 24
    • 84887307535 scopus 로고    scopus 로고
    • A new signature scheme without random oracles from bilinear pairings
    • Proceedings of the 1st International Conference on Cryptology in Vietnam
    • F. Zhang, X. Chen, W. Susilo, and Y. Mu, "A new signature scheme without random oracles from bilinear pairings," in Proceedings of the 1st International Conference on Cryptology in Vietnam, LNCS 4341, 2006, pp. 67-80.
    • (2006) LNCS , vol.4341 , pp. 67-80
    • Zhang, F.1    Chen, X.2    Susilo, W.3    Mu, Y.4
  • 25
    • 70349840877 scopus 로고    scopus 로고
    • An efficient secure proxy verifiably encrypted signature scheme
    • J. Zhang, C. Liu, and Y. Yang, "An effici ent secure proxy verifiably encrypted signature scheme," Journal Network and Computer Applications, Vol. 33, 2010, pp. 29-34.
    • (2010) Journal Network and Computer Applications , vol.33 , pp. 29-34
    • Zhang, J.1    Liu, C.2    Yang, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.