Efficient ID-based blind signature and proxy signature from bilinear pairings

Cited 156 time in webofscience Cited 0 time in scopus
  • Hit : 369
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorZhang, Fangguoko
dc.contributor.authorKim, Kwangjoko
dc.date.accessioned2013-03-04T14:10:48Z-
dc.date.available2013-03-04T14:10:48Z-
dc.date.created2012-02-06-
dc.date.created2012-02-06-
dc.date.issued2003-
dc.identifier.citationINFORMATION SECURITY AND PRIVACY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2727, pp.312 - 323-
dc.identifier.issn0302-9743-
dc.identifier.urihttp://hdl.handle.net/10203/82897-
dc.description.abstractBlind signature and proxy signature are very important technologies in secure e-commerce. Identity-based (simply ID-based) public key cryptosystem can be a good alternative for certificate-based public key setting, especially when efficient key management and moderate security are required. In this paper, we propose a new ID-based blind signature scheme and an ID-based partial delegation proxy signature scheme with warrant based on the bilinear pairings. Also we analyze their security and efficiency. We claim that our new blind signature scheme is more efficient than Zhang and Kim's scheme [27] in Asiacrypt2002.-
dc.languageEnglish-
dc.publisherSPRINGER-VERLAG BERLIN-
dc.subjectPROTOCOL-
dc.subjectSECURITY-
dc.subjectCURVES-
dc.titleEfficient ID-based blind signature and proxy signature from bilinear pairings-
dc.typeArticle-
dc.identifier.wosid000185074400027-
dc.identifier.scopusid2-s2.0-63449088479-
dc.type.rimsART-
dc.citation.volume2727-
dc.citation.beginningpage312-
dc.citation.endingpage323-
dc.citation.publicationnameINFORMATION SECURITY AND PRIVACY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE-
dc.contributor.localauthorKim, Kwangjo-
dc.contributor.nonIdAuthorZhang, Fangguo-
dc.type.journalArticleArticle; Proceedings Paper-
dc.subject.keywordAuthorblind signature-
dc.subject.keywordAuthorproxy signature-
dc.subject.keywordAuthorbilinear pairings-
dc.subject.keywordAuthorID-based cryptography-
dc.subject.keywordPlusPROTOCOL-
dc.subject.keywordPlusSECURITY-
dc.subject.keywordPlusCURVES-
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 156 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0