A new proxy signature scheme providing self-delegation
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee ,Younho | - |
dc.contributor.author | Kim, Heeyoul | - |
dc.contributor.author | Park, Yong su | - |
dc.contributor.author | Yoon, Hyunsoo | - |
dc.date.accessioned | 2022-12-21T09:39:05Z | - |
dc.date.available | 2022-12-21T09:39:05Z | - |
dc.date.created | 2022-09-16 | - |
dc.date.issued | 2006-12 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/180629 | - |
dc.description.abstract | We improve Malkin et al's construction (Eurocrypt'04) of the proxy signature scheme in the random oracle model1. Unlike Malkin et al's scheme, the proposed scheme does not assume the existence of the trusted secure device, which has a global secret key that all users' private keys can be recovered with. This makes the proposed scheme more scalable and efficient because users need not access and cooperate with the secure device to generate their public/private key pairs. We show that the proposed scheme is provably secure based on the modified strong RSA assumption that was made by the Itkis et al (CRYPTO'01). | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | Springer Verlag | - |
dc.title | A new proxy signature scheme providing self-delegation | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Park, Yong su | - |
dc.identifier.doi | 10.1007/11927587_27 | - |
dc.identifier.scopusid | 2-s2.0-34547421991 | - |
dc.identifier.bibliographicCitation | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v.4296 LNCS, pp.328 - 342 | - |
dc.relation.isPartOf | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | - |
dc.citation.title | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | - |
dc.citation.volume | 4296 LNCS | - |
dc.citation.startPage | 328 | - |
dc.citation.endPage | 342 | - |
dc.type.rims | ART | - |
dc.type.docType | Conference Paper | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scopus | - |
dc.subject.keywordPlus | Access control | - |
dc.subject.keywordPlus | Computer programming languages | - |
dc.subject.keywordPlus | Computer system firewalls | - |
dc.subject.keywordPlus | Electronic document identification systems | - |
dc.subject.keywordPlus | Cryptographic protocol | - |
dc.subject.keywordPlus | Proxy signature scheme | - |
dc.subject.keywordPlus | RSA | - |
dc.subject.keywordPlus | Self-delegation | - |
dc.subject.keywordPlus | Data privacy | - |
dc.subject.keywordAuthor | Cryptographic protocol | - |
dc.subject.keywordAuthor | Digital signature | - |
dc.subject.keywordAuthor | Proxy signature | - |
dc.subject.keywordAuthor | Self-delegation | - |
dc.identifier.url | https://link.springer.com/chapter/10.1007/11927587_27 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
222, Wangsimni-ro, Seongdong-gu, Seoul, 04763, Korea+82-2-2220-1365
COPYRIGHT © 2021 HANYANG UNIVERSITY.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.