메뉴 건너뛰기




Volumn 1587, Issue , 1999, Pages 129-134

Repudiation of cheating and non-repudiation of Zhang’s proxy signature schemes

Author keywords

Cryptography; Digital Signatures; ElGa mal signatures; Proxy Signatures

Indexed keywords

AUTHENTICATION; CRYPTOGRAPHY; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS;

EID: 84961291611     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-48970-3_11     Document Type: Conference Paper
Times cited : (10)

References (6)
  • 1
    • 84874800178 scopus 로고
    • A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
    • T. ElGamal, “A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,” IEEE Trans. on Inform. Theory, vol. IT-31, pp. 469-472, July 1985.
    • (1985) IEEE Trans. On Inform. Theory , vol.IT-31 , pp. 469-472
    • Elgamal, T.1
  • 3
    • 0000064722 scopus 로고    scopus 로고
    • 1997 Information Security Workshop, Japan
    • K. Zhang, “Threshold Proxy Signature Scheme,” 1997 Information Security Workshop, Japan, pp. 191-197, 1997.
    • (1997) Threshold Proxy Signature Scheme , pp. 191-197
    • Zhang, K.1
  • 5
    • 84956860632 scopus 로고    scopus 로고
    • On Zhangs Nonrepudiable Proxy Signature Scheme,”
    • (C. Boyd and E. Dawson, eds.), of Lecture Notes in Computer Science, Springer-Verlag (Berlin)
    • N. Lee, T. Hwang, and C. Wang, “On Zhang’s Nonrepudiable Proxy Signature Scheme,” in Proceedings of ACISP‘98 -Australasian Conference on Information Security and Privacy (C. Boyd and E. Dawson, eds.), vol. 1438 of Lecture Notes in Computer Science, pp. 415-422, Springer-Verlag (Berlin), 1998.
    • (1998) Proceedings of ACISP‘98 -Australasian Conference on Information Security and Privacy , vol.1438 , pp. 415-422
    • Lee, N.1    Hwang, T.2    Wang, C.3
  • 6
    • 0030231965 scopus 로고    scopus 로고
    • Proxy Signatures: Delegation of the Power to Sign Messages, IEICE Trans. Fundamentals
    • A, Sept. 1996. also, “Proxy Signatures for Delegating Signing Operation”
    • M. Mambo, K. Usuda, and E. Okamoto, “Proxy Signatures: Delegation of the Power to Sign Messages,” IEICE Trans. Fundamentals, vol. E79-A, pp. 1338-1354, Sept. 1996. also, “Proxy Signatures for Delegating Signing Operation” In Proc. 3rd ACM Conference on Computer and Communications Security, 1996.
    • (1996) Proc. 3Rd ACM Conference on Computer and Communications Security , vol.E79 , pp. 1338-1354
    • Mambo, M.1    Usuda, K.2    Okamoto, E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.