메뉴 건너뛰기




Volumn 188, Issue , 2012, Pages 322-337

Efficient certificateless proxy signature scheme with provable security

Author keywords

Certificateless proxy signature; Certificateless signature; Delegation; Provable security; Proxy signature

Indexed keywords

CERTIFICATELESS; CERTIFICATELESS SIGNATURE; DELEGATION; DIFFIE-HELLMAN PROBLEM; DIGITAL CERTIFICATES; FORMAL SECURITY MODELS; IDENTITY INFORMATION; IMPLICIT CERTIFICATE; ORIGINAL SIGNERS; PROVABLE SECURITY; PROVABLY SECURE; PROXY SIGNATURE SCHEME; PROXY SIGNATURES; PROXY SIGNER; PUBLIC KEYS; RANDOM ORACLE MODEL;

EID: 84855431560     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2011.11.005     Document Type: Article
Times cited : (36)

References (30)
  • 1
    • 34547348650 scopus 로고    scopus 로고
    • ID-based ring signature and proxy ring signature schemes from bilinear pairings
    • A.K. Awasthi, and S. Lal ID-based ring signature and proxy ring signature schemes from bilinear pairings International Journal of Network Security 4 2007 187 192
    • (2007) International Journal of Network Security , vol.4 , pp. 187-192
    • Awasthi, A.K.1    Lal, S.2
  • 2
    • 24744431882 scopus 로고    scopus 로고
    • Certificateless public key cryptography
    • C.S. Laih (Ed.) Taipei, Taiwan, November 2003, LNCS
    • S. Al-Riyami, K. Paterson, Certificateless public key cryptography, in: C.S. Laih (Ed.), Proceedings of the Asiacrypt 2003, Taipei, Taiwan, November 2003, LNCS, vol. 2894, pp. 312-323.
    • Proceedings of the Asiacrypt 2003 , vol.2894 , pp. 312-323
    • Al-Riyami, S.1    Paterson, K.2
  • 4
    • 84946840347 scopus 로고    scopus 로고
    • Short signatures from the weil pairing
    • C. Boyd (Ed.) Gold Coast, Australia, December 2001, LNCS
    • D. Boneh, B. Lynn, H. Shacham, Short signatures from the weil pairing, in: C. Boyd (Ed.), Proceedings of Asiacrypt 2001, Gold Coast, Australia, December 2001, LNCS, vol. 2248, pp. 514-532.
    • Proceedings of Asiacrypt 2001 , vol.2248 , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 7
    • 35748976265 scopus 로고    scopus 로고
    • Certificateless undeniable signature scheme
    • DOI 10.1016/j.ins.2007.08.009, PII S0020025507003842, "Ambient Intelligence"
    • S. Duan Certificateless undeniable signature scheme Information Sciences 178 3 2008 742 755 (Pubitemid 350050958)
    • (2008) Information Sciences , vol.178 , Issue.3 , pp. 742-755
    • Duan, S.1
  • 9
    • 33646852592 scopus 로고    scopus 로고
    • An efficient certificateless signature scheme
    • Y. Hao, J. Liu, Y. Wang, Y.-M. Cheung, H. Yin, L. Jiao, J. Ma, Y.-C. Jiao (Eds.) Xi'an, China, December 2005, LNAI
    • M.C. Gorantla, A. Saxena, An efficient certificateless signature scheme, in: Y. Hao, J. Liu, Y. Wang, Y.-M. Cheung, H. Yin, L. Jiao, J. Ma, Y.-C. Jiao (Eds.), Proceedings of CIS 2005, Xi'an, China, December 2005, LNAI, vol. 3802, pp. 110-116.
    • Proceedings of CIS 2005 , vol.3802 , pp. 110-116
    • Gorantla, M.C.1    Saxena, A.2
  • 10
    • 33644688053 scopus 로고    scopus 로고
    • A novel efficient (t, n) threshold proxy signature scheme
    • DOI 10.1016/j.ins.2005.02.010, PII S0020025505000800
    • H.-F. Huang, and C.-C. Chang A novel efficient (t, n) threshold proxy signature scheme Information Sciences 176 10 2006 1338 1349 (Pubitemid 43332894)
    • (2006) Information Sciences , vol.176 , Issue.10 , pp. 1338-1349
    • Huang, H.-F.1    Chang, C.-C.2
  • 12
    • 35248863570 scopus 로고    scopus 로고
    • Verifiable secret sharing for general access structures with application to fully distributed proxy signatures
    • R.N. Wright (Ed.) French West Indies, January 2003, LNCS
    • J. Herranz, G. Sez, Verifiable secret sharing for general access structures with application to fully distributed proxy signatures, in: R.N. Wright (Ed.), Proceedings of Financial Cryptography 2003, French West Indies, January 2003, LNCS, vol. 2742, pp. 286-302.
    • Proceedings of Financial Cryptography 2003 , vol.2742 , pp. 286-302
    • Herranz, J.1    Sez, G.2
  • 13
    • 33744786523 scopus 로고    scopus 로고
    • On the security of certificateless signature schemes from Asiacrypt 2003
    • Y.G. Desmedt, H. Wang, Y. Mu, Y. Li (Eds.) Xiamen, China, December 2005, LNCS
    • X. Huang, W. Susilo, Y. Mu, F. Zhang, On the security of certificateless signature schemes from Asiacrypt 2003, in: Y.G. Desmedt, H. Wang, Y. Mu, Y. Li (Eds.), Proceedings of CANS 2005, Xiamen, China, December 2005, LNCS, vol. 3810, pp. 13-25.
    • Proceedings of CANS 2005 , vol.3810 , pp. 13-25
    • Huang, X.1    Susilo, W.2    Mu, Y.3    Zhang, F.4
  • 14
    • 78751643334 scopus 로고    scopus 로고
    • Certificateless multi-proxy signature
    • Z. Jin, and Q. Wen Certificateless multi-proxy signature Computer Communications 34 2011 344 352
    • (2011) Computer Communications , vol.34 , pp. 344-352
    • Jin, Z.1    Wen, Q.2
  • 15
    • 3042688872 scopus 로고    scopus 로고
    • Secret computation with secrets for mobile agent using one-time proxy signature
    • Oiso, Japan
    • H. Kim, J. Baek, B. Lee, K. Kim, Secret computation with secrets for mobile agent using one-time proxy signature, Proceedings of SCIS 2001, Oiso, Japan, 2001, pp. 845-850.
    • (2001) Proceedings of SCIS 2001 , pp. 845-850
    • Kim, H.1    Baek, J.2    Lee, B.3    Kim, K.4
  • 17
    • 0010567510 scopus 로고    scopus 로고
    • Proxy signatures, revisited
    • Y. Han, T. Okamoto, S. Quing (Eds.) Beijing, China, November 1997, LNCS
    • S. Kim, S. Park, D. Won, Proxy signatures, revisited, in: Y. Han, T. Okamoto, S. Quing (Eds.), Proceedings of ICICS 97, Beijing, China, November 1997, LNCS, vol. 1334, pp. 223-232.
    • Proceedings of ICICS 97 , vol.1334 , pp. 223-232
    • Kim, S.1    Park, S.2    Won, D.3
  • 18
    • 18244396341 scopus 로고    scopus 로고
    • Certificateless signature and proxy signature schemes from bilinear pairings
    • DOI 10.1007/s10986-005-0008-5
    • X. Li, K. Chen, and L. Sun Certificateless signature and proxy signature schemes from bilinear pairings Lithuanian Mathematical Journal 45 2005 76 83 (Pubitemid 40630178)
    • (2005) Lithuanian Mathematical Journal , vol.45 , Issue.1 , pp. 76-83
    • Li, X.1    Chen, K.2    Sun, L.3
  • 19
    • 1642614187 scopus 로고    scopus 로고
    • Strong proxy signature and its applications
    • Oiso, Japan
    • B. Lee, H. Kim, K. Kim, Strong proxy signature and its applications, Proceedings of SCIS 2001, Oiso, Japan, 2001, pp. 603-608.
    • (2001) Proceedings of SCIS 2001 , pp. 603-608
    • Lee, B.1    Kim, H.2    Kim, K.3
  • 20
    • 34547421991 scopus 로고    scopus 로고
    • A new proxy signature scheme providing self-delegation
    • LNCS
    • Y. Lee, H. Kim, Y. Park, H. Yoon, A new proxy signature scheme providing self-delegation, Proceedings of ICISC 06, LNCS, vol. 4296, pp. 328-342.
    • Proceedings of ICISC 06 , vol.4296 , pp. 328-342
    • Lee, Y.1    Kim, H.2    Park, Y.3    Yoon, H.4
  • 21
    • 0030231965 scopus 로고    scopus 로고
    • Proxy signatures: Delegation of the power to sign messages
    • M. Mambo, K. Usuda, and E. Okamoo Proxy signatures: delegation of the power to sign messages IEICE Transactions on Fundamentals E79-A 1996 1338 1354
    • (1996) IEICE Transactions on Fundamentals , vol.79 E -A , pp. 1338-1354
    • Mambo, M.1    Usuda, K.2    Okamoo, E.3
  • 22
    • 0000901529 scopus 로고    scopus 로고
    • Security arguments for digital signature and blind signature
    • D. Pointcheval, and J. Stern Security arguments for digital signature and blind signature Journal of Cryptology 13 2000 361 396
    • (2000) Journal of Cryptology , vol.13 , pp. 361-396
    • Pointcheval, D.1    Stern, J.2
  • 23
    • 34248512208 scopus 로고    scopus 로고
    • Identity based proxy multi-signature
    • DOI 10.1016/j.jss.2006.12.565, PII S0164121207000039, Dynamic Resource Management in Distributed Real-Time Systems
    • Q. Wang, and Z. Cao Identity based proxy multi-signature The Journal of Systems and Software 80 2007 1023 1029 (Pubitemid 46754473)
    • (2007) Journal of Systems and Software , vol.80 , Issue.7 , pp. 1023-1029
    • Wang, Q.1    Cao, Z.2
  • 24
    • 85020598353 scopus 로고    scopus 로고
    • Identity based cryptosystems and signature schemes
    • G.R. Blakely, D. Chaum (Eds.) California, USA, August 1984, LNCS
    • A. Shamir, Identity based cryptosystems and signature schemes, in: G.R. Blakely, D. Chaum (Eds.), Proceedings of Crypto 1984, California, USA, August 1984, LNCS, vol. 196, pp. 47-53.
    • Proceedings of Crypto 1984 , vol.196 , pp. 47-53
    • Shamir, A.1
  • 25
    • 33845956283 scopus 로고    scopus 로고
    • Simulatability and security of certificateless threshold signatures
    • DOI 10.1016/j.ins.2006.08.008, PII S002002550600243X
    • L. Wang, Z. Cao, X. Li, and H. Qian Simulatability and security of certificateless threshold signatures Information Sciences 177 6 2007 1382 1394 (Pubitemid 46037667)
    • (2007) Information Sciences , vol.177 , Issue.6 , pp. 1382-1394
    • Wang, L.1    Cao, Z.2    Li, X.3    Qian, H.4
  • 26
    • 35048832495 scopus 로고    scopus 로고
    • Generic construction of certificateless signature
    • H. Wang, J. Pieprzyk, V. Varadharajan (Eds.) Sydney, Australia, LNCS
    • D.H. Yum, P.J. Lee, Generic construction of certificateless signature, in: H. Wang, J. Pieprzyk, V. Varadharajan (Eds.), Proceedings of ACISP 2004, Sydney, Australia, LNCS, vol. 3108, pp. 200-211.
    • Proceedings of ACISP 2004 , vol.3108 , pp. 200-211
    • Yum, D.H.1    Lee, P.J.2
  • 27
    • 77954763712 scopus 로고    scopus 로고
    • A provably secure proxy signature scheme in certificateless cryptography
    • H. Xiong, F. Li, and Z. Qin A provably secure proxy signature scheme in certificateless cryptography Informatica, Lithuanian Academy of Sciences 21 2 2010 277 294
    • (2010) Informatica, Lithuanian Academy of Sciences , vol.21 , Issue.2 , pp. 277-294
    • Xiong, H.1    Li, F.2    Qin, Z.3
  • 28
    • 33646690058 scopus 로고    scopus 로고
    • ID-based proxy signature using bilinear pairings
    • G. Chen, Y. Pan, M. Guo, J. Lu (Eds.) Nanjing, China, November 2005, LNCS
    • J. Xu, Z. Zhang, D. Feng, ID-based proxy signature using bilinear pairings, in: G. Chen, Y. Pan, M. Guo, J. Lu (Eds.), Proc. Parallel and Distributed Processing and Applications - ISPA 2005 Workshops, Nanjing, China, November 2005, LNCS, vol. 3759, pp. 359-367.
    • Proc. Parallel and Distributed Processing and Applications - ISPA 2005 Workshops , vol.3759 , pp. 359-367
    • Xu, J.1    Zhang, Z.2    Feng, D.3
  • 29
    • 63449088479 scopus 로고    scopus 로고
    • Efficient ID-Based blind signature and proxy singature from bilinear pairings
    • R. Safavi-Naini, J. Seberry (Eds.) Wollongong, Australia, July 2003, LNCS
    • F. Zhang, K. Kim, Efficient ID-Based blind signature and proxy singature from bilinear pairings, in: R. Safavi-Naini, J. Seberry (Eds.), Proceedings of ACISP 2003, Wollongong, Australia, July 2003, LNCS, vol. 2727, pp. 312-323.
    • Proceedings of ACISP 2003 , vol.2727 , pp. 312-323
    • Zhang, F.1    Kim, K.2
  • 30
    • 33746591632 scopus 로고    scopus 로고
    • Certificateless public-key signature: Security model and efficient construction
    • J. Zhou, M. Yung, F. Bao (Eds.) Singapore, June 2006, LNCS
    • Z. Zhang, D. Wong, J. Xu, D. Feng, Certificateless public-key signature: security model and efficient construction, in: J. Zhou, M. Yung, F. Bao (Eds.), Proceedings ACNS 2006, Singapore, June 2006, LNCS, vol. 3989, pp. 293-308.
    • Proceedings ACNS 2006 , vol.3989 , pp. 293-308
    • Zhang, Z.1    Wong, D.2    Xu, J.3    Feng, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.