DC Field | Value | Language |
---|---|---|
dc.contributor.author | Zhang, Fangguo | ko |
dc.contributor.author | Kim, Kwangjo | ko |
dc.date.accessioned | 2013-03-04T14:10:48Z | - |
dc.date.available | 2013-03-04T14:10:48Z | - |
dc.date.created | 2012-02-06 | - |
dc.date.created | 2012-02-06 | - |
dc.date.issued | 2003 | - |
dc.identifier.citation | INFORMATION SECURITY AND PRIVACY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2727, pp.312 - 323 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | http://hdl.handle.net/10203/82897 | - |
dc.description.abstract | Blind signature and proxy signature are very important technologies in secure e-commerce. Identity-based (simply ID-based) public key cryptosystem can be a good alternative for certificate-based public key setting, especially when efficient key management and moderate security are required. In this paper, we propose a new ID-based blind signature scheme and an ID-based partial delegation proxy signature scheme with warrant based on the bilinear pairings. Also we analyze their security and efficiency. We claim that our new blind signature scheme is more efficient than Zhang and Kim's scheme [27] in Asiacrypt2002. | - |
dc.language | English | - |
dc.publisher | SPRINGER-VERLAG BERLIN | - |
dc.subject | PROTOCOL | - |
dc.subject | SECURITY | - |
dc.subject | CURVES | - |
dc.title | Efficient ID-based blind signature and proxy signature from bilinear pairings | - |
dc.type | Article | - |
dc.identifier.wosid | 000185074400027 | - |
dc.identifier.scopusid | 2-s2.0-63449088479 | - |
dc.type.rims | ART | - |
dc.citation.volume | 2727 | - |
dc.citation.beginningpage | 312 | - |
dc.citation.endingpage | 323 | - |
dc.citation.publicationname | INFORMATION SECURITY AND PRIVACY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE | - |
dc.contributor.localauthor | Kim, Kwangjo | - |
dc.contributor.nonIdAuthor | Zhang, Fangguo | - |
dc.type.journalArticle | Article; Proceedings Paper | - |
dc.subject.keywordAuthor | blind signature | - |
dc.subject.keywordAuthor | proxy signature | - |
dc.subject.keywordAuthor | bilinear pairings | - |
dc.subject.keywordAuthor | ID-based cryptography | - |
dc.subject.keywordPlus | PROTOCOL | - |
dc.subject.keywordPlus | SECURITY | - |
dc.subject.keywordPlus | CURVES | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.