메뉴 건너뛰기




Volumn 17 LNICST, Issue , 2009, Pages 58-70

An ECDLP-based threshold proxy signature scheme using self-certified public key system

Author keywords

[No Author keywords available]

Indexed keywords

COLLUSION ATTACK; COMMUNICATION COST; COMPUTATION OVERHEADS; DISTINGUISHABILITY; IDENTIFIABILITY; IDENTITY-BASED; ORIGINAL SIGNERS; PROXY PROTECTION; PROXY SIGNATURE SCHEME; PROXY SIGNATURES; PROXY SIGNER; PUBLIC KEY SUBSTITUTION ATTACK; PUBLIC KEY SYSTEMS; PUBLIC KEYS; SECURITY PROPERTIES; SELFCERTIFIED PUBLIC KEY; SIGN MESSAGES; THRESHOLD PROXY SIGNATURES; THRESHOLD SECRET SHARE; UNFORGEABILITY; VERIFIABILITY;

EID: 80052394012     PISSN: 18678211     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-04434-2_6     Document Type: Conference Paper
Times cited : (3)

References (23)
  • 2
    • 0036864802 scopus 로고    scopus 로고
    • Improvement of a threshold proxy signature scheme
    • Li, J.G., Cao, Z.F.: Improvement of a Threshold Proxy Signature Scheme. J. of Computer Research and Development 39(11), 515-518 (2002)
    • (2002) J. of Computer Research and Development , vol.39 , Issue.11 , pp. 515-518
    • Li, J.G.1    Cao, Z.F.2
  • 5
    • 0038358035 scopus 로고    scopus 로고
    • Cryptographic analysis and modification of proxy multi-signature scheme
    • Li, J.G., Cao, Z.F., Zhang, Y.C., Li, J.Z.: Cryptographic Analysis and Modification of Proxy Multi-signature Scheme. High Technology Letters 13(4), 1-5 (2003)
    • (2003) High Technology Letters , vol.13 , Issue.4 , pp. 1-5
    • Li, J.G.1    Cao, Z.F.2    Zhang, Y.C.3    Li, J.Z.4
  • 6
    • 0035451175 scopus 로고    scopus 로고
    • New nonrepudiable threshold proxy signature scheme with known signers
    • Hsu, C.L., Wu, T.S., Wu, T.C.: New Nonrepudiable Threshold Proxy Signature Scheme with Known Signers. The J. of Systems and Software 58, 119-124 (2001)
    • (2001) The J. of Systems and Software , vol.58 , pp. 119-124
    • Hsu, C.L.1    Wu, T.S.2    Wu, T.C.3
  • 7
    • 0141518230 scopus 로고    scopus 로고
    • A secure nonrepudiable threshold proxy signature scheme with known signers
    • Hwang, M.S., Lin, I.C., Lu Eric, J.L.: A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers. International J. of Informatica 11(2), 1-8 (2000)
    • (2000) International J. of Informatica , vol.11 , Issue.2 , pp. 1-8
    • Hwang, M.S.1    Lin, I.C.2    Lu Eric, J.L.3
  • 8
    • 0141865656 scopus 로고    scopus 로고
    • Cryptanalysis of nonrepudiable threshold proxy signature scheme with known signers
    • Hwang, S.J., Chen, C.C.: Cryptanalysis of Nonrepudiable Threshold Proxy Signature Scheme with Known Signers. Informatica 14(2), 205-212 (2003)
    • (2003) Informatica , vol.14 , Issue.2 , pp. 205-212
    • Hwang, S.J.1    Chen, C.C.2
  • 9
    • 0032670844 scopus 로고    scopus 로고
    • An efficient nonrepudiable threshold proxy signature scheme with known signers
    • Sun, H.M.: An Efficient Nonrepudiable Threshold Proxy Signature Scheme with Known Signers. Computer Communications 22(8), 717-722 (1999)
    • (1999) Computer Communications , vol.22 , Issue.8 , pp. 717-722
    • Sun, H.M.1
  • 11
    • 0000064722 scopus 로고    scopus 로고
    • Threshold proxy signature schemes
    • Zhang, K.: Threshold Proxy Signature Schemes. In: Information Security Workshop, pp. 191-197 (1997)
    • (1997) Information Security Workshop , pp. 191-197
    • Zhang, K.1
  • 13
    • 0345060338 scopus 로고    scopus 로고
    • Improved nonrepudiable threshold proxy signature scheme with known signers
    • Tsai, C.S., Tzeng, S.F., Hwang, M.S.: Improved Nonrepudiable Threshold Proxy Signature Scheme with Known Signers. Informatica 14(3), 393-402 (2003)
    • (2003) Informatica , vol.14 , Issue.3 , pp. 393-402
    • Tsai, C.S.1    Tzeng, S.F.2    Hwang, M.S.3
  • 17
    • 0038241111 scopus 로고    scopus 로고
    • Generalization of proxy signature-based on discrete logarithms
    • Li, L.H., Tzeng, S.F., Hwang, M.S.: Generalization of proxy signature-based on discrete logarithms. Computers & Security 22(3), 245-255 (2003)
    • (2003) Computers & Security , vol.22 , Issue.3 , pp. 245-255
    • Li, L.H.1    Tzeng, S.F.2    Hwang, M.S.3
  • 18
    • 35048839196 scopus 로고    scopus 로고
    • Efficient proxy signature schemes using self-certified public keys
    • Press, Corrected Proof, Available online July 9
    • Hsu, C.L., Wu, T.S.: Efficient proxy signature schemes using self-certified public keys. Applied Mathematics and Computation. In: Press, Corrected Proof, Available online July 9 (2003)
    • (2003) Applied Mathematics and Computation
    • Hsu, C.L.1    Wu, T.S.2
  • 19
    • 0344512405 scopus 로고    scopus 로고
    • Generalization of proxy signature based on elliptic curves
    • Hwang, M.S., Tzeng, S.F., Tsai, C.S.: Generalization of proxy signature based on elliptic curves. Computer Standards & Interfaces 26(2), 73-84 (2004)
    • (2004) Computer Standards & Interfaces , vol.26 , Issue.2 , pp. 73-84
    • Hwang, M.S.1    Tzeng, S.F.2    Tsai, C.S.3
  • 20
    • 84937570422 scopus 로고
    • Self-certified public keys
    • Davies, D.W. (ed.) LNCS Springer, Heidelberg
    • Girault, M.: Self-certified public keys. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 490-497. Springer, Heidelberg (1991)
    • (1991) EUROCRYPT 1991 , vol.547 , pp. 490-497
    • Girault, M.1
  • 21
    • 85015402934 scopus 로고
    • Use of elliptic curves in cryptography
    • Williams, H.C. (ed.) LNCS Springer, Heidelberg
    • Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417-426. Springer, Heidelberg (1986)
    • (1986) CRYPTO 1985 , vol.218 , pp. 417-426
    • Miller, V.S.1
  • 22
    • 84936033986 scopus 로고
    • The digital signature standard proposed by NIST
    • National Institute of Standards and Technology (NIST)
    • National Institute of Standards and Technology (NIST), The digital signature standard proposed by NIST. Communication of the ACM 35(7), 36-40 (1992)
    • (1992) Communication of the ACM , vol.35 , Issue.7 , pp. 36-40
  • 23
    • 0030192262 scopus 로고    scopus 로고
    • Parallel computation of the generating keys for RSA cryptosystems
    • Chang, C.C., Hwang, M.S.: Parallel computation of the generating keys for RSA cryptosystems. IEE Electronics Letters 32(15), 1365-1366 (1996) (Pubitemid 126496105)
    • (1996) Electronics Letters , vol.32 , Issue.15 , pp. 1365-1366
    • Chang, C.C.1    Hwang, M.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.