A Time-limited Forward-secure Proxy Signature Scheme
![]() |
김상희
(이화여자대학교 컴퓨터학과)
조태남 (이화여자대학교 컴퓨터학과) 이상호 (이화여자대학교 컴퓨터학과) 채기준 (이화여자대학교 컴퓨터학과) 박운주 (한국전자통신연구원) 나재훈 (한국전자통신연구원) |
1 | M. Mambo. K. Usuda and E. Okamoto. 'Proxy Signatures: Delegation of the Power to Sign Message,' IEICE Trans. Fundamentals, Vol. E79 A, No. 9, 1996 |
2 | S. Kim, S. Park and D. Won, 'Proxy Signatures, Revisited,' Proc. of ICICS 97, 1997 DOI ScienceOn |
3 | B. Lee, H. Kim and K. Kim, 'Strong Proxy Signature and its Applications,' Proc, of SCIS 2001, 2001 |
4 | H. M. Sun, 'Design of Time Stamped Proxy Sig nature with Traceable Receivers,' Proc. of IEE Computers and Digital Techniques, Vol. 147, No. 6, 2000 DOI ScienceOn |
5 | M. Bellare and S. Miner, 'A Forward Secure Digital Signature Scheme,' Crypto'99, 1999 |
6 | G. Itkis and L. Reyzin, 'Forward Secure Signatures with Optimal Signing and Verifying,' Crypto'01, 2001 |
7 | G. Itkis and L. Reyzin, 'SiBIR: Signer Base Intrusion-Resilient Signatures,' Crypto'02, 2002 |
8 | H. Krawczyk, 'Simple Forward Secure Signatures from any Signature Scheme,' 7th ACM Conference on Computer and Communication Security, 2000 DOI |
9 | T. Malkin, D. Micciancio, and S. Miner, 'Efficient Generic Forward -Secure Signatures with an Unbo unded Number of Time Periods,' Eurocrypt'02, 2002 |
10 | Y. Dodis, J. Katz, S. Xu and M. Yung, 'Key Insulated Public Key Cryptosystems,' Eurocrypt'02, 2002 |
11 | C. P. Schnorr, 'Efficient Signature Generation by Smart Cards,' Journal of Cryptology, Vol. 4, 1991 DOI |
12 | A. J. Menezes, P. C. Oorschot and S. A. Vanstone, Handbook of Applied Cryptography, CRC, 1997 |
13 | S. Haber and W. Stornetta, 'How to Time Stamp a Digital Document,' Proc, of Crypto'90, Vol. 537, 1990 DOI |
14 | A. Buldas, P. Laud, H. Lipmaa and J. Villemson, 'Time Stamping with Binary Linking Schemes,' Proc. of Crypto'98, 1998 |
15 | A. Fiat and A. Shamir, 'How to Prove Yourself: Practical Solutions to Identification and Signature Problems,' Proc. of Crypto'86, Vol. 263, 1986 |
![]() |