메뉴 건너뛰기




Volumn , Issue , 2012, Pages 48-53

Design of an efficient ID-based short designated verifier proxy signature scheme

Author keywords

bilinear pairings; designated verifier; Elliptic curve cryptography; ID based cryptosystem; short proxy signature

Indexed keywords

BILINEAR PAIRING; DESIGNATED VERIFIERS; ELLIPTIC CURVE CRYPTOGRAPHY; ID-BASED CRYPTOSYSTEMS; PROXY SIGNATURES;

EID: 84862067193     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/RAIT.2012.6194478     Document Type: Conference Paper
Times cited : (5)

References (20)
  • 1
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • SpringerVerlag New York, USA
    • A. Shamir, "Identity-based cryptosystems and signature schemes," Proceedings of CRYPTO'84 on Advances in cryptology, SpringerVerlag, New York, USA, 1984, pp. 47-53.
    • (1984) Proceedings of CRYPTO'84 on Advances in Cryptology , pp. 47-53
    • Shamir, A.1
  • 2
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing," SIAM Journal on Computing, vol. 32, 2003, pp. 586-615.
    • (2003) SIAM Journal on Computing , vol.32 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 3
    • 23044435711 scopus 로고    scopus 로고
    • Short signatures from the weil pairing
    • D. Boneh, B. Lynn, H Shacham, "Short signatures from the Weil pairing," Journal of Cryptology vol. 17, no. 4, 2004, pp. 297-319.
    • (2004) Journal of Cryptology , vol.17 , Issue.4 , pp. 297-319
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 4
    • 0000112683 scopus 로고
    • Elliptic curve cryptosystem
    • N. Koblitz, "Elliptic curve cryptosystem," Journal of Mathematics of Computation, vol. 48, no. 177, 1987, pp. 203-209.
    • (1987) Journal of Mathematics of Computation , vol.48 , Issue.177 , pp. 203-209
    • Koblitz, N.1
  • 5
    • 85015402934 scopus 로고
    • Use of elliptic curves in cryptography
    • Springer-Verlag, New York
    • V.S. Miller, "Use of elliptic curves in cryptography," Proceeding on Advances in cryptology-CRYPTO'85, Springer-Verlag, New York, 1985, pp. 417-426.
    • (1985) Proceeding on Advances in Cryptology-CRYPTO'85 , pp. 417-426
    • Miller, V.S.1
  • 6
    • 78049296439 scopus 로고    scopus 로고
    • A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges
    • X. Cao, W. Kou and X. Du, "A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges," Information Sciences, vol. 180, 2010, pp. 2895-2903.
    • (2010) Information Sciences , vol.180 , pp. 2895-2903
    • Cao, X.1    Kou, W.2    Du, X.3
  • 7
    • 80052774690 scopus 로고    scopus 로고
    • A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
    • S. H. Islam and G. P. Biswas, "A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem," Journal of Systems and Software, vol. 84, 2011, pp. 1892-1898.
    • (2011) Journal of Systems and Software , vol.84 , pp. 1892-1898
    • Islam, S.H.1    Biswas, G.P.2
  • 8
    • 84892506781 scopus 로고    scopus 로고
    • Design of improved password authentication and update scheme based on elliptic curve cryptography
    • DOIs: 10.1016/j.mcm.2011.07.001
    • S. H. Islam and G. P. Biswas, "Design of improved password authentication and update scheme based on elliptic curve cryptography," Mathematical and Computer Modelling, 2011, DOIs: 10.1016/j.mcm.2011.07.001.
    • (2011) Mathematical and Computer Modelling
    • Islam, S.H.1    Biswas, G.P.2
  • 10
    • 78049311231 scopus 로고    scopus 로고
    • Forgery attacks on kang et al.'s identity-based strong designated verifier signature scheme and its improvement with security proof
    • J. S. Lee, J. H. Chang and D. H. Lee, "Forgery attacks on Kang et al.'s identity-based strong designated verifier signature scheme and its improvement with security proof," Computers and Electrical Engineering, vol. 36, 2010, pp. 948-954.
    • (2010) Computers and Electrical Engineering , vol.36 , pp. 948-954
    • Lee, J.S.1    Chang, J.H.2    Lee, D.H.3
  • 11
    • 58449129370 scopus 로고    scopus 로고
    • A novel identity-based strong designated verifier signature scheme
    • B. Kang, C. Boyd and E. Dawson, "A novel identity-based strong designated verifier signature scheme," The Journal of Systems and Software, vol. 82, 2009, pp. 270-273.
    • (2009) The Journal of Systems and Software , vol.82 , pp. 270-273
    • Kang, B.1    Boyd, C.2    Dawson, E.3
  • 12
    • 0030231965 scopus 로고    scopus 로고
    • Proxy signatures: Delegation of the power to sign messages
    • M. Mambo, K. Usuda and E. Okamoto, "Proxy signatures: delegation of the power to sign messages," IEICE Transactions on Fundamentals, vol. E79-A, no. 9, 1996, pp. 1338-1354.
    • (1996) IEICE Transactions on Fundamentals , vol.E79-A , Issue.9 , pp. 1338-1354
    • Mambo, M.1    Usuda, K.2    Okamoto, E.3
  • 14
    • 0010567510 scopus 로고    scopus 로고
    • Proxy signatures, revisited
    • LNCS, Springer-Verlag
    • S. Kim, S. Park and D. Won, "Proxy signatures, revisited," In: ICICS'97, LNCS, Springer-Verlag, 1997, pp. 223-232.
    • (1997) ICICS'97 , pp. 223-232
    • Kim, S.1    Park, S.2    Won, D.3
  • 15
    • 84927752554 scopus 로고    scopus 로고
    • Designated verifier proofs and their applications
    • LNCS Springer-Verlag
    • M. Jakobsson, K. Sako and R. Impagliazzo, "Designated verifier proofs and their applications," In: Advances in cryptology: Eurocrypt'96, LNCS, vol.1070, Springer-Verlag, 1996, pp. 142-54.
    • (1996) Advances in Cryptology: Eurocrypt'96 , vol.1070 , pp. 142-154
    • Jakobsson, M.1    Sako, K.2    Impagliazzo, R.3
  • 16
    • 24744449733 scopus 로고    scopus 로고
    • A proposal for short signature scheme using pairings
    • IEEE Computer Society
    • T. Okamoto, A. Inomata and E. Okamoto, A proposal for short signature scheme using pairings, ITCC 2005, IEEE Computer Society, 2005, pp. 631-635.
    • (2005) ITCC 2005 , pp. 631-635
    • Okamoto, T.1    Inomata, A.2    Okamoto, E.3
  • 17
    • 33744906308 scopus 로고    scopus 로고
    • Short designated verifier proxy signature from pairings
    • LNCS
    • X. Huang, Y. Mu, W. Susilo and F. Zhang, "Short designated verifier proxy signature from pairings," In: EUC Workshops 2005, in: LNCS, vol. 3823, 2005, pp. 835-844.
    • (2005) EUC Workshops 2005 , vol.3823 , pp. 835-844
    • Huang, X.1    Mu, Y.2    Susilo, W.3    Zhang, F.4
  • 18
    • 79955721446 scopus 로고    scopus 로고
    • Short designated verifier proxy signatures
    • K-A. Shim, "Short designated verifier proxy signatures," Computers and Electrical Engineering, vol. 37, 2011, pp. 180-186.
    • (2011) Computers and Electrical Engineering , vol.37 , pp. 180-186
    • Shim, K.-A.1
  • 19
    • 33751417424 scopus 로고    scopus 로고
    • A novel proxy key generation protocol and its application
    • X. Hu and S. Huang, "A novel proxy key generation protocol and its application," Computer Standards & Interfaces, vol. 29, 2007, pp. 191-195.
    • (2007) Computer Standards & Interfaces , vol.29 , pp. 191-195
    • Hu, X.1    Huang, S.2
  • 20
    • 55749094333 scopus 로고    scopus 로고
    • A privacy problem on hu-huang's proxy key generation protocol
    • H. Park, S. Lim, and I. Yie, "A privacy problem on Hu-Huang's proxy key generation protocol," Computer Standards & Interfaces, vol. 31, 2009, pp. 480-483.
    • (2009) Computer Standards & Interfaces , vol.31 , pp. 480-483
    • Park, H.1    Lim, S.2    Yie, I.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.