Security of Lu et al.'s proxy-protected signature scheme

Cited 1 time in webofscience Cited 0 time in scopus
  • Hit : 271
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorPark, JHko
dc.contributor.authorKang, Bo Gyeongko
dc.date.accessioned2013-03-06T12:44:09Z-
dc.date.available2013-03-06T12:44:09Z-
dc.date.created2012-02-06-
dc.date.created2012-02-06-
dc.date.issued2005-10-
dc.identifier.citationAPPLIED MATHEMATICS AND COMPUTATION, v.169, no.2, pp.1010 - 1015-
dc.identifier.issn0096-3003-
dc.identifier.urihttp://hdl.handle.net/10203/87012-
dc.description.abstractRecently, Lu et al. presented a proxy-protected signature scheme that is based on the improved Rabin signature. We show that their scheme does not satisfy a security requirement necessary for proxy signature schemes. This results in generating proxy signatures without any permission from an original signer.-
dc.languageEnglish-
dc.publisherELSEVIER SCIENCE INC-
dc.titleSecurity of Lu et al.'s proxy-protected signature scheme-
dc.typeArticle-
dc.identifier.wosid000232811600023-
dc.identifier.scopusid2-s2.0-25844450360-
dc.type.rimsART-
dc.citation.volume169-
dc.citation.issue2-
dc.citation.beginningpage1010-
dc.citation.endingpage1015-
dc.citation.publicationnameAPPLIED MATHEMATICS AND COMPUTATION-
dc.identifier.doi10.1016/j.amc.2004.11.019-
dc.contributor.nonIdAuthorPark, JH-
dc.type.journalArticleArticle-
Appears in Collection
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 1 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0