메뉴 건너뛰기




Volumn 181, Issue , 2005, Pages 409-423

Designated-verifier proxy signature schemes

Author keywords

digital signature; information security; proxy signature

Indexed keywords

AUTHENTICATION; NETWORK SECURITY; SECURITY OF DATA; UBIQUITOUS COMPUTING; MOBILE SECURITY;

EID: 84885075425     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: 10.1007/0-387-25660-1_27     Document Type: Conference Paper
Times cited : (36)

References (29)
  • 4
    • 11244339991 scopus 로고    scopus 로고
    • Secure proxy signature schemes for delegation of signing rights
    • A. Boldyreva, A. Palacio, and B. Warinschi, Secure proxy signature schemes for delegation of signing rights, Cryptology ePrint archive; http://eprint.iacr.org/20O3/096M, ay 2003.
    • (2003) Cryptology ePrint archive
    • Boldyreva, A.1    Palacio, A.2    Warinschi, B.3
  • 6
    • 0010252194 scopus 로고
    • Undeniable signatures
    • Springer-Verlag
    • D. Chaum and H. van Antwerpen, Undeniable signatures, in: CRYPT0'89, LNCS 435, pp. 212-2 16, Springer-Verlag, 1989.
    • (1989) CRYPT0'89, LNCS 435 , pp. 212-216
    • Chaum, D.1    van Antwerpen, H.2
  • 7
    • 85043778396 scopus 로고
    • Zero-knowledge undeniable signatures
    • Springer-Verlag
    • D. Chaum, Zero-knowledge undeniable signatures, in: EUROCRYPT'90, LNCS 473, pp. 458-464, Springer-Verlag, 1991.
    • (1991) EUROCRYPT'90, LNCS , vol.473 , pp. 458-464
    • Chaum, D.1
  • 8
    • 85028745474 scopus 로고
    • Special uses and abuses of the Fiat-Shamir passport protocol
    • Springer-Verlag
    • Y. Desmedt, C. Coutier, and S. Bengio, Special uses and abuses of the Fiat-Shamir passport protocol, in: CRYPT0'87, pp. 2 1-39, Springer-Verlag, 1987.
    • (1987) CRYPT0'87 , pp. 21-39
    • Desmedt, Y.1    Coutier, C.2    Bengio, S.3
  • 9
    • 84958770476 scopus 로고
    • Weakness of undeniable signature schemes
    • Springer-Verlag
    • Y. Desmedt and M. Yung, Weakness of undeniable signature schemes, in: EUROCRYPT'9 1, LNCS 547, pp: 205-220, Springer-Verlag, 1991.
    • (1991) EUROCRYPT'91, LNCS 547 , pp. 205-220
    • Desmedt, Y.1    Yung, M.2
  • 10
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • April
    • S. Goldwasser, S. Micah, and R. Rivest, A digital signature scheme secure against adaptive chosen-message attacks, SIAM Journal of Computing, 17(2): 281-308 (April 1988).
    • (1988) SIAM Journal of Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micah, S.2    Rivest, R.3
  • 11
    • 35248863570 scopus 로고    scopus 로고
    • Verifiable secret sharing for general access structures, with applications to fully distributed proxy signatures
    • Springer-Verlag
    • J. Herranz and Saez, Verifiable secret sharing for general access structures, with applications to fully distributed proxy signatures, in: Financial Cryptography (FC103), LNCS 2742, pp. 286-302, Springer-Verlag, 2003.
    • (2003) Financial Cryptography (FC103), LNCS 2742 , pp. 286-302
    • Herranz, J.1    Saez2
  • 12
    • 84927728020 scopus 로고
    • Blackmailing using undeniable signatures
    • Springer-Verlag
    • M. Jakobsson, Blackmailing using undeniable signatures, in: EUROCRYPTt96, LNCS 950, pp.: 425-427, Springer-Verlag, 1994.
    • (1994) EUROCRYPT 96, LNCS 950 , pp. 425-427
    • Jakobsson, M.1
  • 13
    • 84927752554 scopus 로고    scopus 로고
    • Designated verifier proofs and their applications
    • Springer-Verlag
    • M. Jakobsson, K. Sako, and R. Impagliazzo, Designated verifier proofs and their applications, in: EUROCRYPT'96, LNCS 1070, pp. 143-154, Springer-Verlag, 1996.
    • (1996) EUROCRYPT 96, LNCS 1070 , pp. 143-154
    • Jakobsson, M.1    Sako, K.2    Impagliazzo, R.3
  • 15
    • 84958751721 scopus 로고    scopus 로고
    • Secure mobile agent using strong non-designated proxy signature
    • LNCS 21 19, Springer-Verlag
    • B. Lee, H. Kim, and K. Kim. Secure mobile agent using strong non-designated proxy signature, in: Information Security and Privacy (ACISP'OI), LNCS 21 19, pp. 474-486, Springer-Verlag, 2001.
    • (2001) Information Security and Privacy (ACISP'OI) , pp. 474-486
    • Lee, B.1    Kim, H.2    Kim, K.3
  • 16
    • 35248866917 scopus 로고    scopus 로고
    • An analysis of proxy signatures: Is a secure channel necessary?
    • in, Springer-Verlag
    • J.-Y. Lee, J. H. Cheon, and S. Kim, An analysis of proxy signatures: Is a secure channel necessary? in: Topics in Cryptology-CT-RSA 2003, LNCS 26 12, pp. 68-79, Springer-Verlag, 2003.
    • (2003) Topics in Cryptology-CT-RSA 2003, LNCS 26 12 , pp. 68-79
    • Lee, J.-Y.1    Cheon, J.H.2    Kim, S.3
  • 17
    • 0030231965 scopus 로고    scopus 로고
    • Proxy signatures: Delegation of the power to sign messages
    • Sep
    • M. Mambo, K. Usuda, and E. Okamoto, Proxy signatures: Delegation of the power to sign messages, IEICE Trans. Fundamentals, Vol. E79-A, No. 9, pp. 1338-1353 (Sep. 1996).
    • (1996) IEICE Trans. Fundamentals , vol.E79-A , Issue.9 , pp. 1338-1353
    • Mambo, M.1    Usuda, K.2    Okamoto, E.3
  • 21
    • 0000901529 scopus 로고    scopus 로고
    • Security arguments for digital signatures and blind signatures
    • D. Pointcheval and J. Stem, Security arguments for digital signatures and blind signatures, Journal of Cryptology, 13(3): 361-369 (2000).
    • (2000) Journal of Cryptology , vol.13 , Issue.3 , pp. 361-369
    • Pointcheval, D.1    Stem, J.2
  • 23
    • 12344258539 scopus 로고
    • Efficient signature generation by smart cards
    • C. Schnorr, Efficient signature generation by smart cards, Journal of Cryptography, 4(3): 161-174 (1991).
    • (1991) Journal of Cryptography , vol.4 , Issue.3 , pp. 161-174
    • Schnorr, C.1
  • 24
    • 84957026429 scopus 로고    scopus 로고
    • Security of blind discrete log signatures against interactive attacks
    • (ICICS'OI), LNCS 2229, Springer-Verlag
    • C. Schnorr, Security of blind discrete log signatures against interactive attacks, in: Information and Communications Security (ICICS'OI), LNCS 2229, pp. 1-12, Springer-Verlag, 200 1.
    • (2001) Information and Communications Security , pp. 1-12
    • Schnorr, C.1
  • 26
    • 35048841170 scopus 로고    scopus 로고
    • Efficient extension of standard Schnorri RSA signatures into universal designated-verifier signatures
    • Springer-Verlag
    • R. Steinfeld, H. Wang, and J. Piepnyk, Efficient extension of standard Schnorri RSA signatures into universal designated-verifier signatures, in: PKC 2004, LNCS 2947, pp. 86-100, Springer-Verlag, 2004.
    • (2004) PKC 2004, LNCS 2947 , pp. 86-100
    • Steinfeld, R.1    Wang, H.2    Piepnyk, J.3
  • 29
    • 84945962241 scopus 로고    scopus 로고
    • Threshold proxy signature schemes
    • in, (ISW197), LNCS 1396, Springer-Verlag
    • K. Zhang, Threshold proxy signature schemes, in: Information Security Workshop (ISW197), LNCS 1396, pp. 282-290, Springer-Verlag, 1997.
    • (1997) Information Security Workshop , pp. 282-290
    • Zhang, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.