메뉴 건너뛰기




Volumn 160, Issue 1, 2005, Pages 245-260

New identity-based society oriented signature schemes from pairings on elliptic curves

Author keywords

Cryptography; Digital signature; Elliptic curve; Identity based; Multisignature; Pairing; Society oriented

Indexed keywords

DESIGN; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; ELLIPSOMETRY; PERFORMANCE; SOCIAL ASPECTS;

EID: 8344247772     PISSN: 00963003     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.amc.2003.07.016     Document Type: Article
Times cited : (14)

References (21)
  • 1
    • 85032188633 scopus 로고
    • Society and group oriented cryptography: A new concept
    • Spring-Verlag
    • Desmedt Y. Society and group oriented cryptography: a new concept. Advances in Cryptology - CRYPTO 87. 1988;120-127 Spring-Verlag.
    • (1988) Advances in Cryptology - CRYPTO 87 , pp. 120-127
    • Desmedt, Y.1
  • 2
    • 0037200866 scopus 로고    scopus 로고
    • An identity-based society oriented signature scheme with anonymous signers
    • Saeednia S. An identity-based society oriented signature scheme with anonymous signers. Inform. Process. Lett. 83:2002;295-299.
    • (2002) Inform. Process. Lett. , vol.83 , pp. 295-299
    • Saeednia, S.1
  • 3
    • 35248880074 scopus 로고    scopus 로고
    • Efficient threshold signature, multisignature and blind signature schemes based on the gap-Diffie-Hellman-group signature scheme
    • Springer-Verlag
    • Boldyreva A. Efficient threshold signature, multisignature and blind signature schemes based on the gap-Diffie-Hellman-group signature scheme. Proceedings of International Workshop on Practice and Theory in Public Key Cryptography - PKC2003. 2003;31-46 Springer-Verlag.
    • (2003) Proceedings of International Workshop on Practice and Theory in Public Key Cryptography - PKC2003 , pp. 31-46
    • Boldyreva, A.1
  • 5
    • 84957801031 scopus 로고
    • A practical digital multisignature scheme based on discrete logarithms
    • Springer-Verlag
    • Hardjono T., Zheng Y. A practical digital multisignature scheme based on discrete logarithms. Advance in Cryptology - AUSCRYPT 92. 1992;122-132 Springer-Verlag.
    • (1992) Advance in Cryptology - AUSCRYPT 92 , pp. 122-132
    • Hardjono, T.1    Zheng, Y.2
  • 7
    • 84947558992 scopus 로고
    • A paradoxical identity-based signature scheme resulting from zero-knowledge
    • Springer-Verlag
    • Guillou L., Quisquater J.J. A paradoxical identity-based signature scheme resulting from zero-knowledge. Advances in Cryptology - CRYPTO 88. 1989;216-231 Springer-Verlag.
    • (1989) Advances in Cryptology - CRYPTO 88 , pp. 216-231
    • Guillou, L.1    Quisquater, J.J.2
  • 8
    • 8344287127 scopus 로고    scopus 로고
    • Remarks in Saeednia's identity-based society oriented signature scheme with anonymous signers
    • 10 March
    • G. Wang, B. Zhu, Remarks in Saeednia's identity-based society oriented signature scheme with anonymous signers, Cryptology ePrint Archive, Report 2003/046, 10 March 2003. Available from http://eprint.iacr.org/2003/046.
    • (2003) Cryptology ePrint Archive, Report , vol.2003 , Issue.46
    • Wang, G.1    Zhu, B.2
  • 10
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Springer-Verlag
    • Boneh D., Franklin M. Identity-based encryption from the Weil pairing. Advances in Cryptology - CRYOTO 2001. 2001;213-229 Springer-Verlag.
    • (2001) Advances in Cryptology - CRYOTO 2001 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 11
    • 1642414982 scopus 로고    scopus 로고
    • Cryptography from pairings: A snapshot of current research
    • K.G. Paterson, Cryptography from pairings: a snapshot of current research, Information Security Technical Report 7 (3) (2002) 41-54. Available from http://www.isg.rhul.ac.uk/~kp/.
    • (2002) Information Security Technical Report , vol.7 , Issue.3 , pp. 41-54
    • Paterson, K.G.1
  • 12
    • 0027662341 scopus 로고
    • Reducing elliptic curve logarithms to logarithms in a finite field
    • Menezes A.J., Okamoto T., Vanstone S. Reducing elliptic curve logarithms to logarithms in a finite field. IEEE Trans. Inform. Theory. 39:1993;1639-1646.
    • (1993) IEEE Trans. Inform. Theory , vol.39 , pp. 1639-1646
    • Menezes, A.J.1    Okamoto, T.2    Vanstone, S.3
  • 13
    • 84946844750 scopus 로고    scopus 로고
    • A one round protocol for tripartite Diffie-Hellman
    • Springer-Verlag
    • Joux A. A one round protocol for tripartite Diffie-Hellman. Algorithmic Number Theory Symposium, ANTS-IV. 2000;385-394 Springer-Verlag.
    • (2000) Algorithmic Number Theory Symposium, ANTS-IV , pp. 385-394
    • Joux, A.1
  • 15
    • 0037194815 scopus 로고    scopus 로고
    • ID-based signatures from pairings on elliptic curves
    • Paterson K.G. ID-based signatures from pairings on elliptic curves. Electron. Lett. 38(18):2002;1025-1026.
    • (2002) Electron. Lett. , vol.38 , Issue.18 , pp. 1025-1026
    • Paterson, K.G.1
  • 16
    • 84958765355 scopus 로고    scopus 로고
    • ID-based blind signature and ring signature from pairings
    • Springer-Verlag
    • Zhang F., Kim K. ID-based blind signature and ring signature from pairings. Advances in Cryptology - ASIACRYPT 2002. 2002;533-547 Springer-Verlag.
    • (2002) Advances in Cryptology - ASIACRYPT 2002 , pp. 533-547
    • Zhang, F.1    Kim, K.2
  • 18
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Springer-Verlag
    • Shamir A. Identity-based cryptosystems and signature schemes. Advances in Cryptology - CRYPTO 84. 1984;47-53 Springer-Verlag.
    • (1984) Advances in Cryptology - CRYPTO 84 , pp. 47-53
    • Shamir, A.1
  • 19
    • 84955582446 scopus 로고    scopus 로고
    • On the risk of disruption in several multiparty signature schemes
    • Springer-Verlag
    • Michels M., Horster P. On the risk of disruption in several multiparty signature schemes. Advances in Cryptology - ASIACRYPT 96. 1996;334-345 Springer-Verlag.
    • (1996) Advances in Cryptology - ASIACRYPT 96 , pp. 334-345
    • Michels, M.1    Horster, P.2
  • 20
    • 8344253818 scopus 로고    scopus 로고
    • Federal Information Processing Standard Publication 180-2
    • NIST, Federal Information Processing Standard Publication 180-2, Secure Hash Standard (SHS), 2002. Available from http://csrc.nist.gov/publications/ fips/fips180-2/fips180-2.pdf.
    • (2002) Secure Hash Standard (SHS)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.