메뉴 건너뛰기




Volumn 12, Issue 3, 2013, Pages 1018-1025

An efficient threshold anonymous authentication scheme for privacy-preserving communications

Author keywords

Anonymity authentication; random oracle secure; system of linear equations; threshold ring signature; unconditional secure; unforgeability

Indexed keywords

ANONYMITY AUTHENTICATIONS; RANDOM ORACLE; SYSTEM OF LINEAR EQUATIONS; THRESHOLD RING SIGNATURES; UNCONDITIONAL SECURE; UNFORGEABILITY;

EID: 84875591362     PISSN: 15361276     EISSN: None     Source Type: Journal    
DOI: 10.1109/TWC.2012.12.112120     Document Type: Article
Times cited : (23)

References (19)
  • 2
    • 74549210063 scopus 로고    scopus 로고
    • Universal authentication protocols for anonymous wireless communications
    • Jan.
    • G. Yang, Q. Huang, D. S. Wong, and X. Deng, "Universal authentication protocols for anonymous wireless communications," IEEE Trans. Wireless Commun., vol. 9, no. 1, pp. 168-184, Jan. 2010.
    • (2010) IEEE Trans. Wireless Commun , vol.9 , Issue.1 , pp. 168-184
    • Yang, G.1    Huang, Q.2    Wong, D.S.3    Deng, X.4
  • 3
    • 79960556311 scopus 로고    scopus 로고
    • Generalized digital certificate for user authentication and key establishment for secure communications
    • July
    • L. Harn and J. Ren, "Generalized digital certificate for user authentication and key establishment for secure communications," IEEE Trans. Wireless Commun., vol. 10, no. 7, July 2011.
    • (2011) IEEE Trans. Wireless Commun , vol.10 , Issue.7
    • Harn, L.1    Ren, J.2
  • 13
    • 0028508211 scopus 로고
    • Group-oriented (t, n) threshold signature and multisignature
    • Sep
    • L. Harn, "Group-oriented (t, n) threshold signature and multisignature," IEE Proc.-Computers and Digital Techniques, vol. 141, no. 5, pp. 307-313, Sep. 1994.
    • (1994) IEE Proc.-Computers and Digital Techniques , vol.141 , Issue.5 , pp. 307-313
    • Harn, L.1
  • 14
    • 0347616995 scopus 로고    scopus 로고
    • On the arithmetic operational complexity for solving Vandermonde linear equations
    • Feb
    • L. Li, "On the arithmetic operational complexity for solving Vandermonde linear equations," Japan J. Industrial and Applied Mathematics, vol. 17, no. 1, pp. 15-18, Feb. 2000.
    • (2000) Japan J. Industrial and Applied Mathematics , vol.17 , Issue.1 , pp. 15-18
    • Li, L.1
  • 15
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, "How to share a secret," Commun. of the ACM, vol. 22, no. 11, pp. 612-613, 1979.
    • (1979) Commun. of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 16
    • 51849154205 scopus 로고    scopus 로고
    • Comparing symmetric-key and public-key based security schemes in sensor networks a case study of user access control
    • H. Wang, S. Sheng, C. Tan, and Q. Li, "Comparing symmetric-key and public-key based security schemes in sensor networks a case study of user access control," in Proc. 2008 IEEE ICDCS, pp. 11-18.
    • Proc. 2008 IEEE ICDCS , pp. 11-18
    • Wang, H.1    Sheng, S.2    Tan, C.3    Li, Q.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.