메뉴 건너뛰기




Volumn 26, Issue 1, 2014, Pages 89-97

Certificateless short sequential and broadcast multisignature schemes using elliptic curve bilinear pairings

Author keywords

Bilinear pairing; Certificateless cryptography; Elliptic curve cryptography; Identity based cryptography; Public key infrastructure; Short multisignature

Indexed keywords


EID: 85006213882     PISSN: 13191578     EISSN: 22131248     Source Type: Journal    
DOI: 10.1016/j.jksuci.2013.05.001     Document Type: Article
Times cited : (20)

References (50)
  • 4
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Springer-Verlag
    • Boneh D., Franklin M.K. Identity-based encryption from the Weil pairing. Proceedings of the Crypto'01, LNCS 2001, 2139:213-229. Springer-Verlag.
    • (2001) Proceedings of the Crypto'01, LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.K.2
  • 5
    • 23044435711 scopus 로고    scopus 로고
    • Short signatures from the Weil pairing
    • Boneh D., Lynn B., Shacham H. Short signatures from the Weil pairing. J. Cryptol. 2004, 17(4):297-319.
    • (2004) J. Cryptol. , vol.17 , Issue.4 , pp. 297-319
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 6
    • 78049296439 scopus 로고    scopus 로고
    • A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges
    • Cao X., Kou W., Du X. A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges. Inf. Sci. 2010, 180(15):2895-2903.
    • (2010) Inf. Sci. , vol.180 , Issue.15 , pp. 2895-2903
    • Cao, X.1    Kou, W.2    Du, X.3
  • 8
    • 0028378975 scopus 로고
    • Identity-based conference key broadcast schemes with authentication
    • Chen J.L., Hwang T. Identity-based conference key broadcast schemes with authentication. Comput. Secur. 1994, 13:53-57.
    • (1994) Comput. Secur. , vol.13 , pp. 53-57
    • Chen, J.L.1    Hwang, T.2
  • 9
    • 3242668605 scopus 로고    scopus 로고
    • Digital multi-signature scheme based on the elliptic curve cryptosystem
    • Chen T.-S., Huang K.-H., Chung Y.-F. Digital multi-signature scheme based on the elliptic curve cryptosystem. J. Comput. Sci. Technol. 2004, 19(4):570-573.
    • (2004) J. Comput. Sci. Technol. , vol.19 , Issue.4 , pp. 570-573
    • Chen, T.-S.1    Huang, K.-H.2    Chung, Y.-F.3
  • 10
    • 58049090877 scopus 로고    scopus 로고
    • An Efficient Certificateless Short Designated Verifier Signature Scheme
    • Chen, H., Song, R., Zhang, F., Song, F., 2008. An Efficient Certificateless Short Designated Verifier Signature Scheme. In: Proceedings of the WiCOM'08, pp. 1-6.
    • (2008) Proceedings of the WiCOM'08 , pp. 1-6
    • Chen, H.1    Song, R.2    Zhang, F.3    Song, F.4
  • 11
    • 79952987257 scopus 로고    scopus 로고
    • A new provably secure certificateless short signature scheme
    • Choi K.Y., Park J.H., Lee D.H. A new provably secure certificateless short signature scheme. Comput. Math. Appl. 2011, 61:1760-1768.
    • (2011) Comput. Math. Appl. , vol.61 , pp. 1760-1768
    • Choi, K.Y.1    Park, J.H.2    Lee, D.H.3
  • 13
    • 34548129922 scopus 로고    scopus 로고
    • ID-based digital signature scheme on the elliptic curve cryptosystem
    • Chung Y.F., Huang K.H., Lai F., Chen T.S. ID-based digital signature scheme on the elliptic curve cryptosystem. Comput. Stand. Interfaces 2007, 29:601-604.
    • (2007) Comput. Stand. Interfaces , vol.29 , pp. 601-604
    • Chung, Y.F.1    Huang, K.H.2    Lai, F.3    Chen, T.S.4
  • 14
    • 84878621601 scopus 로고    scopus 로고
    • A novel proxy signature scheme based on user hierarchical access control policy
    • Elsevier
    • Das A.K., Massand A., Patil S. A novel proxy signature scheme based on user hierarchical access control policy. J. King Saud Univ.-Comput. Inf. Sci. 2013, Elsevier, Vol. 25:219-228.
    • (2013) J. King Saud Univ.-Comput. Inf. Sci. , vol.25 , pp. 219-228
    • Das, A.K.1    Massand, A.2    Patil, S.3
  • 15
    • 0017018484 scopus 로고
    • New directions in cryptography
    • Diffie W., Hellman M. New directions in cryptography. IEEE Trans. Inf. Theory 1976, 22(6):644-654.
    • (1976) IEEE Trans. Inf. Theory , vol.22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.2
  • 16
    • 55749090987 scopus 로고    scopus 로고
    • Efficient and provably-secure certificateless short signature scheme from bilinear pairings
    • Du H., Wen Q. Efficient and provably-secure certificateless short signature scheme from bilinear pairings. Comput. Stand. Interfaces 2009, 31(2):390-394.
    • (2009) Comput. Stand. Interfaces , vol.31 , Issue.2 , pp. 390-394
    • Du, H.1    Wen, Q.2
  • 17
    • 0032649638 scopus 로고    scopus 로고
    • The tate pairing and the discrete logarithm applied to elliptic curve cryptosystems
    • Frey G., Muller M., Ruck H.-G. The tate pairing and the discrete logarithm applied to elliptic curve cryptosystems. IEEE Trans. Inf. Theory 1999, 45(5):1717-1719.
    • (1999) IEEE Trans. Inf. Theory , vol.45 , Issue.5 , pp. 1717-1719
    • Frey, G.1    Muller, M.2    Ruck, H.-G.3
  • 19
    • 84948978775 scopus 로고    scopus 로고
    • An Algorithm for Solving the Discrete Log Problem on Hyperelliptic Curves
    • Gaudry, P., 2000. An Algorithm for Solving the Discrete Log Problem on Hyperelliptic Curves. In Proceedings of the Advances in Cryptology (Eurocrypt'00), LNCS, vol. 1807, pp. 19-34.
    • (2000) Proceedings of the Advances in Cryptology (Eurocrypt'00), LNCS , vol.1807 , pp. 19-34
    • Gaudry, P.1
  • 22
    • 33646852592 scopus 로고    scopus 로고
    • An efficient certificateless signature scheme
    • Springer-Verlag
    • Gorantla M.C., Saxena A. An efficient certificateless signature scheme. Proceedings of the ICCIS'05, LNAI 2005, 3028:110-116. Springer-Verlag.
    • (2005) Proceedings of the ICCIS'05, LNAI , vol.3028 , pp. 110-116
    • Gorantla, M.C.1    Saxena, A.2
  • 24
    • 0028762624 scopus 로고
    • New digital signature scheme based on discrete logarithms
    • Harn L. New digital signature scheme based on discrete logarithms. Electronic Lett. 1994, 30(5):396-398.
    • (1994) Electronic Lett. , vol.30 , Issue.5 , pp. 396-398
    • Harn, L.1
  • 25
    • 44849107153 scopus 로고    scopus 로고
    • Efficient identity-based RSA multisignatures
    • Harn L., Ren J. Efficient identity-based RSA multisignatures. Comput. Secur. 2010, 27:12-15.
    • (2010) Comput. Secur. , vol.27 , pp. 12-15
    • Harn, L.1    Ren, J.2
  • 26
    • 84855353789 scopus 로고    scopus 로고
    • An ID-based proxy signature schemes without bilinear pairings
    • He D., Chen J., Hu J. An ID-based proxy signature schemes without bilinear pairings. Ann. Telecommun. 2011, 66(11-12):657-662.
    • (2011) Ann. Telecommun. , vol.66 , Issue.11-12 , pp. 657-662
    • He, D.1    Chen, J.2    Hu, J.3
  • 29
    • 84870878817 scopus 로고    scopus 로고
    • A pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks
    • Islam S.H., Biswas G.P. A pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks. Ann. Telecommun. 2012, 67(11-12):547-558.
    • (2012) Ann. Telecommun. , vol.67 , Issue.11-12 , pp. 547-558
    • Islam, S.H.1    Biswas, G.P.2
  • 31
    • 84907333919 scopus 로고    scopus 로고
    • Provably secure certificateless strong designated verifier signature scheme based on elliptic curve bilinear pairings
    • Islam S.H., Biswas G.P. Provably secure certificateless strong designated verifier signature scheme based on elliptic curve bilinear pairings. J. King Saud Univ.-Comput. Inf. Sci. 2013, 25:51-61.
    • (2013) J. King Saud Univ.-Comput. Inf. Sci. , vol.25 , pp. 51-61
    • Islam, S.H.1    Biswas, G.P.2
  • 32
    • 85006189366 scopus 로고    scopus 로고
    • A provably secure identity-based strong designated verifier proxy signature scheme from bilinear pairings
    • Elsevier
    • Islam S.H., Biswas G.P. A provably secure identity-based strong designated verifier proxy signature scheme from bilinear pairings. J. King Saud Univ. - Comput. Inf. Sci. 2013, Elsevier, Vol. 26:55-67.
    • (2013) J. King Saud Univ. - Comput. Inf. Sci. , vol.26 , pp. 55-67
    • Islam, S.H.1    Biswas, G.P.2
  • 33
    • 84889263311 scopus 로고    scopus 로고
    • Provably secure and pairing-free certificateless digital signature scheme using elliptic curve cryptography
    • Islam S.H., Biswas G.P. Provably secure and pairing-free certificateless digital signature scheme using elliptic curve cryptography. Int. J. Comput. Math. 2013, doi: 10.1080/00207160.2013.776674.
    • (2013) Int. J. Comput. Math.
    • Islam, S.H.1    Biswas, G.P.2
  • 34
    • 0020832088 scopus 로고
    • A public-key cryptosystem suitable for digital multisignatures
    • Itakura K., Nakamura K. A public-key cryptosystem suitable for digital multisignatures. NEC J. Res. Dev. 1983, 71:1-8.
    • (1983) NEC J. Res. Dev. , vol.71 , pp. 1-8
    • Itakura, K.1    Nakamura, K.2
  • 35
    • 0000112683 scopus 로고
    • Elliptic curve cryptosystem
    • Koblitz N. Elliptic curve cryptosystem. J. Math. Comput. 1987, 48(177):203-209.
    • (1987) J. Math. Comput. , vol.48 , Issue.177 , pp. 203-209
    • Koblitz, N.1
  • 36
    • 0024864204 scopus 로고
    • Hyperelliptic cryptosystems
    • Koblitz N. Hyperelliptic cryptosystems. J. Cryptol. 1989, 1(3):139-150.
    • (1989) J. Cryptol. , vol.1 , Issue.3 , pp. 139-150
    • Koblitz, N.1
  • 38
    • 0027662341 scopus 로고
    • Reducing elliptic curve logarithms to logarithms in a finite field
    • Menezes A.J., Okamoto T., Vanstone S.A. Reducing elliptic curve logarithms to logarithms in a finite field. IEEE Trans. Inf. Theory 1993, 39(5):1639-1646.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.5 , pp. 1639-1646
    • Menezes, A.J.1    Okamoto, T.2    Vanstone, S.A.3
  • 40
    • 85015402934 scopus 로고
    • Use of elliptic curves in cryptography
    • Springer-Verlag
    • Miller V.S. Use of elliptic curves in cryptography. Proceeding of the Crypto'85, LNCS 1985, 417-426. Springer-Verlag.
    • (1985) Proceeding of the Crypto'85, LNCS , pp. 417-426
    • Miller, V.S.1
  • 42
    • 0036260890 scopus 로고    scopus 로고
    • Dynamic reblocking rsa-based multisignatures scheme for computer and communication networks
    • Pon S.-F., Lu E.-H., Lee J.-Y. Dynamic reblocking rsa-based multisignatures scheme for computer and communication networks. IEEE Commun. Lett. 2002, 6(1):43-44.
    • (2002) IEEE Commun. Lett. , vol.6 , Issue.1 , pp. 43-44
    • Pon, S.-F.1    Lu, E.-H.2    Lee, J.-Y.3
  • 43
    • 36248988077 scopus 로고    scopus 로고
    • On broadcast authentication in wireless sensor networks
    • Ren K., Lou W., Zeng K., Moran P.J. On broadcast authentication in wireless sensor networks. IEEE Trans. Wireless Commun. 2007, 6(11):4136-4144.
    • (2007) IEEE Trans. Wireless Commun. , vol.6 , Issue.11 , pp. 4136-4144
    • Ren, K.1    Lou, W.2    Zeng, K.3    Moran, P.J.4
  • 44
    • 85020598353 scopus 로고
    • Identity based cryptosystems and signature schemes
    • Springer-Verlag
    • Shamir A. Identity based cryptosystems and signature schemes. Proceedings of the Crypto'84, LNCS 1984, 196:47-53. Springer-Verlag.
    • (1984) Proceedings of the Crypto'84, LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 45
    • 85006196010 scopus 로고
    • MIRACLE Library
    • Shamus Software Ltd. 1988. MIRACLE Library. Available from: http://www.shamus.ie/index.php?page=home.
    • (1988)
  • 46
    • 37549067371 scopus 로고    scopus 로고
    • Forgery attacks on the ID-based multisignature scheme without reblocking and predetermined signing order
    • Shim K.A. Forgery attacks on the ID-based multisignature scheme without reblocking and predetermined signing order. Comput. Stand. Interfaces 2008, 30:121-123.
    • (2008) Comput. Stand. Interfaces , vol.30 , pp. 121-123
    • Shim, K.A.1
  • 49
    • 77952296047 scopus 로고    scopus 로고
    • Java Implementation for Pairing-Based Cryptosystems
    • Springer Verlag
    • Tan S.Y., Heng S.H., Goi B.M. Java Implementation for Pairing-Based Cryptosystems. Proceedings of the ICCSA 2010, LNCS 2010, 188-198. Springer Verlag, vol. 6019.
    • (2010) Proceedings of the ICCSA 2010, LNCS , vol.6019 , pp. 188-198
    • Tan, S.Y.1    Heng, S.H.2    Goi, B.M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.