메뉴 건너뛰기




Volumn 28, Issue 4, 2012, Pages 771-785

An efficient strong designated verifier proxy signature scheme for electronic commerce

Author keywords

Designated verifier; Digital signature; Discrete logarithms; Proxy; Public key system

Indexed keywords

COMPUTATIONAL COSTS; DESIGNATED VERIFIER SIGNATURES; DESIGNATED VERIFIERS; DESIGNATED-VERIFIER PROXY SIGNATURES; DIGITAL SIGNATURE SCHEMES; DISCRETE LOGARITHMS; NON-TRANSFERABILITY; PROXY; PROXY SIGNATURE SCHEME; PROXY SIGNATURES; PROXY SIGNER; PUBLIC KEY SYSTEMS; PUBLICLY VERIFIABLE; RANDOM ORACLE MODEL; SECURITY REQUIREMENTS; THIRD PARTIES; UNFORGEABILITY;

EID: 84862874457     PISSN: 10162364     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (19)

References (26)
  • 1
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms", IEEE Transactions on Information Theory, Vol. IT-31, 1985, pp. 469-472.
    • (1985) IEEE Transactions on Information Theory , vol.IT-31 , pp. 469-472
    • ElGamal, T.1
  • 2
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • DOI 10.1145/359340.359342
    • R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems", Communications of the ACM, Vol. 21, 1978, pp. 120-126. (Pubitemid 8591219)
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 7
    • 0027316628 scopus 로고
    • Proxy-based authorization and accounting for distributed systems
    • 1993 IEEE 13th International Conference on Distributed Computing Systems
    • B. C. Neuman, "Proxy-based authentication and accounting for distributed systems", Proceedings of the 13th International Conference on Distributed Computing Systems, 1993, pp. 283-291. (Pubitemid 23674537)
    • (1993) Proceedings - International Conference on Distributed Computing Systems , pp. 283-291
    • Neuman B.Clifford1
  • 10
    • 84927752554 scopus 로고    scopus 로고
    • Designated verifier proofs and their applications
    • M. Jakobsson, K. Sako, and R. Impagliazzo, "Designated verifier proofs and their applications", Advances in Cryptology - EUROCRYPT, 1996, pp. 143-154. (Pubitemid 126071061)
    • (1996) LNCS , Issue.1070 , pp. 143-154
    • Jakobsson, M.1    Sako, K.2    Impagliazzo, R.3
  • 12
    • 84957080948 scopus 로고    scopus 로고
    • A simple publicly verifiable secret sharing scheme and its application to electronic voting
    • B. Schoenmakers, "A simple publicly verifiable secret sharing scheme and its application to electronic voting", Advances in Cryptology - CRYPTO, 1999, pp. 148-164.
    • (1999) Advances in Cryptology - CRYPTO , pp. 148-164
    • Schoenmakers, B.1
  • 13
    • 38049090929 scopus 로고    scopus 로고
    • An attack on not-interactive designated verifier proofs for undeniable signatures
    • G. Wang, "An attack on not-interactive designated verifier proofs for undeniable signatures", Cryptology ePrint Archive, Report 2003/243, 2003, http://eprint.iacr.org/2003/243.
    • Cryptology EPrint Archive, Report 2003/243, 2003
    • Wang, G.1
  • 15
    • 49549102632 scopus 로고    scopus 로고
    • Short designated verifier signature scheme and its identity-based variant
    • X. Huang, W. Susilo, Y. Mu, and F. Zhang, "Short designated verifier signature scheme and its identity-based variant", International Journal of Network Security, Vol. 6, 2008, pp. 82-93.
    • (2008) International Journal of Network Security , vol.6 , pp. 82-93
    • Huang, X.1    Susilo, W.2    Mu, Y.3    Zhang, F.4
  • 16
    • 58449129370 scopus 로고    scopus 로고
    • A novel identity-based strong designated verifier signature scheme
    • B. Kang, C. Boyd, and E. Dawson, "A novel identity-based strong designated verifier signature scheme", The Journal of Systems and Software, Vol. 82, 2009, pp. 270-273.
    • (2009) The Journal of Systems and Software , vol.82 , pp. 270-273
    • Kang, B.1    Boyd, C.2    Dawson, E.3
  • 18
    • 65949086470 scopus 로고    scopus 로고
    • Identity-based strong designated verifier signature schemes
    • W. Susilo, F. Zhang, and Y. Mu, "Identity-based strong designated verifier signature schemes", Information Security and Privacy, Vol. 3108, 2004, pp. 167-170.
    • (2004) Information Security and Privacy , vol.3108 , pp. 167-170
    • Susilo, W.1    Zhang, F.2    Mu, Y.3
  • 19
    • 35948963685 scopus 로고    scopus 로고
    • A novel ID-based designated verifier signature scheme
    • DOI 10.1016/j.ins.2007.07.005, PII S0020025507003581, Ambient Intelligence
    • J. Zhang and J. Mao, "A novel ID-based designated verifier signature scheme", Information Sciences, Vol. 178, 2008, pp. 766-773. (Pubitemid 350064276)
    • (2008) Information Sciences , vol.178 , Issue.3 , pp. 766-773
    • Zhang, J.1    Mao, J.2
  • 20
    • 80054072609 scopus 로고    scopus 로고
    • Multi-designated verifiers signatures revisited
    • S. S. M. Chow, "Multi-designated verifiers signatures revisited", International Journal of Network Security, Vol. 7, 2008, pp. 348-357.
    • (2008) International Journal of Network Security , vol.7 , pp. 348-357
    • Chow, S.S.M.1
  • 22
    • 79953840004 scopus 로고    scopus 로고
    • A provably secure and efficient strong designated verifier signature scheme
    • F. Y. Yang and C. M. Liao, "A provably secure and efficient strong designated verifier signature scheme", International Journal of Network Security, Vol. 10, 2010, pp. 220-224.
    • (2010) International Journal of Network Security , vol.10 , pp. 220-224
    • Yang, F.Y.1    Liao, C.M.2
  • 26
    • 0000901529 scopus 로고    scopus 로고
    • Security arguments for digital signatures and blind signatures
    • D. Pointcheval and J. Stern, "Security arguments for digital signatures and blind signatures", Journal of Cryptology, Vol. 13, 2000, pp. 361-369.
    • (2000) Journal of Cryptology , vol.13 , pp. 361-369
    • Pointcheval, D.1    Stern, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.