메뉴 건너뛰기




Volumn 41, Issue 1, 2012, Pages 60-68

A verifiable proxy signature scheme based on bilinear pairings with identity-based cryptographic approaches

Author keywords

Identity based cryptosystem; Privacy; Proxy signature

Indexed keywords


EID: 84872251767     PISSN: 1392124X     EISSN: None     Source Type: Journal    
DOI: 10.5755/j01.itc.41.1.830     Document Type: Article
Times cited : (4)

References (22)
  • 1
    • 32544436746 scopus 로고    scopus 로고
    • Proxy blind signature scheme
    • January
    • A. K. Awasthi, S. Lal. "Proxy blind signature scheme," Transaction on Cryptology, Vol. 2, No. 1, January 2005, pp. 5-11.
    • (2005) Transaction On Cryptology , vol.2 , Issue.1 , pp. 5-11
    • Awasthi, A.K.1    Lal, S.2
  • 2
    • 84874324906 scopus 로고    scopus 로고
    • Identity based encryption from the Weil pairing
    • LNCS, Vol. 2139, Springer-Verlag
    • D. Boneh, M. Franklin. "Identity based encryption from the Weil pairing," Advances in Cryptology-Cryto'01, LNCS, Vol. 2139, Springer-Verlag, 2001, pp. 213-229.
    • (2001) Advances In Cryptology-Cryto'01 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 3
    • 84946840347 scopus 로고    scopus 로고
    • Short signatures from the Weil pairing
    • LNCS, Springer-Verlag
    • D. Boneh, B. Lynn, H. Shacham. "Short signatures from the Weil pairing," Advances in Cryptology-Asiacryp'01, LNCS, Vol. 2248, Springer-Verlag, 2001, pp. 514-532.
    • (2001) Advances In Cryptology-Asiacryp'01 , vol.2248 , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 4
    • 35248844436 scopus 로고    scopus 로고
    • An identity-based signature from gap Diffie-Hellman groups
    • Springer-Verlag
    • J. C. Cha, J. H. Cheon. "An identity-based signature from gap Diffie-Hellman groups," Proceedings of PKC'03, LNCS, Vol. 2567, Springer-Verlag, 2003, pp. 18-30.
    • (2003) Proceedings of PKC'03, LNCS , vol.2567 , pp. 18-30
    • Cha, J.C.1    Cheon, J.H.2
  • 7
    • 56649114655 scopus 로고    scopus 로고
    • An RSA-based (t,n) threshold proxy signature scheme with freewill identities
    • Y. F. Chang, C. C. Chang. "An RSA-based (t,n) threshold proxy signature scheme with freewill identities," International Journal of Information and Computer Security, Vol. 1, No. 1/2, 2007, pp. 201-209.
    • (2007) International Journal of Information and Computer Security , vol.1 , Issue.1-2 , pp. 201-209
    • Chang, Y.F.1    Chang, C.C.2
  • 9
    • 35248867510 scopus 로고    scopus 로고
    • Efficient identity based signature schemes based on pairings
    • LNCS, Springer-Verlag
    • F. Hess. "Efficient identity based signature schemes based on pairings," Proceedings of SAC'02, LNCS, Vol. 2595, Springer-Verlag, 2002, pp. 310-324.
    • (2002) Proceedings of SAC'02 , vol.2595 , pp. 310-324
    • Hes, F.1
  • 10
    • 33751417424 scopus 로고    scopus 로고
    • A novel proxy key generation protocol and its application
    • X. Hu, S. Huang. "A novel proxy key generation protocol and its application," Computer Standards &interfaces, Vol. 29, 2007, 191-195.
    • (2007) Computer Standards &interfaces , vol.29 , pp. 191-195
    • Hu, X.1    Huang, S.2
  • 11
    • 84872222358 scopus 로고    scopus 로고
    • An improved twoparty identity-based authenticated key agreement protocol using pairings
    • Article in Press, Available online 27 January
    • M. Hölbl, T. Welzer, B. Brumen. "An improved twoparty identity-based authenticated key agreement protocol using pairings," Journal of Computer and System Sciences, Article in Press, Available online 27 January 2011.
    • (2011) Journal of Computer and System Sciences
    • Hölbl, M.1    Welzer, T.2    Brumen, B.3
  • 12
    • 84872254411 scopus 로고    scopus 로고
    • LAP Lambert Academic Publishing AG & Co KG, ISBN: 9783844382266
    • J. Kar. Proxy Blind Multi-signature Scheme, LAP Lambert Academic Publishing AG & Co KG, ISBN: 9783844382266, 2011.
    • (2011) Proxy Blind Multi-signature Scheme
    • Kar, J.1
  • 14
    • 78049311231 scopus 로고    scopus 로고
    • Forgery attacks on Kang et al.'s identity-based strong designated verifier signature scheme and its improvement with security proof
    • J. S. Lee, J. H. Chang, D. H. Lee. "Forgery attacks on Kang et al.'s identity-based strong designated verifier signature scheme and its improvement with security proof," Computers and Electrical Engineering, Vol. 36, 2010, pp. 948-954.
    • (2010) Computers and Electrical Engineering , vol.36 , pp. 948-954
    • Lee, J.S.1    Chang, J.H.2    Lee, D.H.3
  • 15
    • 84958751721 scopus 로고    scopus 로고
    • Secure mobile agent using strong non-designated proxy signature
    • LNCS, Springer-Verlag
    • B. Lee, H. Kim, K. Won. "Secure mobile agent using strong non-designated proxy signature," Proceedings of ACISP'01, LNCS, Vol. 2119, Springer-Verlag, 2001, pp. 474-486.
    • (2001) Proceedings of ACISP'01 , vol.2119 , pp. 474-486
    • Lee, B.1    Kim, H.2    Won, K.3
  • 16
    • 0030231965 scopus 로고    scopus 로고
    • Proxy signature: Delegation of the power to sign messages
    • M. Mambo, K. Usuda, E. Okamoto. "Proxy signature: delegation of the power to sign messages," IEICE Transactions on Fundamentals, Vol. E79-A, No. 9, 1996, pp. 1338-1354.
    • (1996) IEICE Transactions On Fundamentals , vol.E79-A , pp. 1338-1354
    • Mambo, M.1    Usuda, K.2    Okamoto, E.3
  • 17
    • 55749094333 scopus 로고    scopus 로고
    • A privacy problem on Hu-Huang's proxy key generation protocol
    • H. Park, S. Lim, I. Yie. "A privacy problem on Hu-Huang's proxy key generation protocol," Computer Standards & Interfaces, Vol. 31, 2009, pp. 480-483.
    • (2009) Computer Standards & Interfaces , vol.31 , pp. 480-483
    • Park, H.1    Lim, S.2    Yie, I.3
  • 19
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Springer-Verlag
    • A. Shamir. "Identity-based cryptosystems and signature schemes," Advances in Cryptology -Crypto'84, LNCS, Vol. 196, Springer-Verlag, 1984, pp.47-53.
    • (1984) Advances In Cryptology -Crypto'84 , vol.196 , pp. 47-53
    • Shamir, A.1
  • 20
    • 79955721446 scopus 로고    scopus 로고
    • Short designated verifier proxy signature
    • K. A. Shim. "Short designated verifier proxy signature," Computers and Electrical Engineering, Vol. 37, No. 2, 2011, pp. 180-186.
    • (2011) Computers and Electrical Engineering , vol.37 , Issue.2 , pp. 180-186
    • Shim, K.A.1
  • 21
    • 78650973925 scopus 로고    scopus 로고
    • Improvement of a self proxy signature scheme
    • Q. Xie. "Improvement of a self proxy signature scheme," Applied Mechanics and Materials, Vol. 40-41, 2011, pp. 643-646.
    • (2011) Applied Mechanics and Materials , vol.40-41 , pp. 643-646
    • Xie, Q.1
  • 22
    • 84855277570 scopus 로고    scopus 로고
    • An efficient and secure identity-based strong designated verifier signature scheme
    • E. J. Yoon. "An efficient and secure identity-based strong designated verifier signature scheme," Information Technology and Control, Vol. 40, No. 4, 2011, pp. 323-329.
    • (2011) Information Technology and Control , vol.40 , Issue.4 , pp. 323-329
    • Yoon, E.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.