Open Access System for Information Sharing

Login Library

 

Article
Cited 539 time in webofscience Cited 0 time in scopus
Metadata Downloads
Full metadata record
Files in This Item:
There are no files associated with this item.
DC FieldValueLanguage
dc.contributor.authorCha, JC-
dc.contributor.authorCheon, JH-
dc.date.accessioned2016-04-01T08:44:49Z-
dc.date.available2016-04-01T08:44:49Z-
dc.date.created2009-08-21-
dc.date.issued2003-01-
dc.identifier.issn0302-9743-
dc.identifier.other2003-OAK-0000017388-
dc.identifier.urihttps://oasis.postech.ac.kr/handle/2014.oak/28675-
dc.description.abstractIn this paper we propose an identity (ID)-based signature scheme using gap Diffie-Hellman (GDH) groups. Our scheme is proved secure against existential forgery on adaptively chosen message and ID attack under the random oracle model. Using GDH groups obtained from bilinear pairings, as a special case of our scheme, we obtain an ID-based signature scheme that shares the same system parameters with the ID-based encryption scheme (BF-IBE) by Boneh and Franklin [BF01] and is as efficient as the BF-IBE. Combining our signature scheme with the BF-IBE yields a complete solution of an ID-based public key system. It can be an alternative for certificate-based public key infrastructures, especially when efficient key management and moderate security are required.-
dc.description.statementofresponsibilityX-
dc.languageEnglish-
dc.publisherSPRINGER-VERLAG BERLIN-
dc.relation.isPartOfPUBLIC KEY CRYPTOGRAPHY - PKC 2003, PROCEEDINGS-
dc.subjectID-based signature-
dc.subjectCDH group-
dc.subjectelliptic curve-
dc.subjectWeil pairing-
dc.subjectSECURITY-
dc.subjectSCHEMES-
dc.titleAN IDENTITY-BASED SIGNATURE FROM GAP DIFFIE-HELLMAN GROUPS-
dc.typeArticle-
dc.contributor.college수학과-
dc.author.googleCHA, JC-
dc.author.googleCHEON, JH-
dc.relation.volume2567-
dc.relation.startpage18-
dc.relation.lastpage30-
dc.contributor.id10057066-
dc.relation.journal"PUBLIC KEY CRYPTOGRAPHY - PKC 2003, PROCEEDINGS"-
dc.relation.indexSCI급, SCOPUS 등재논문-
dc.relation.sciSCIE-
dc.collections.nameConference Papers-
dc.type.rimsART-
dc.identifier.bibliographicCitationPUBLIC KEY CRYPTOGRAPHY - PKC 2003, PROCEEDINGS, v.2567, pp.18 - 30-
dc.identifier.wosid000181654600002-
dc.date.tcdate2019-02-01-
dc.citation.endPage30-
dc.citation.startPage18-
dc.citation.titlePUBLIC KEY CRYPTOGRAPHY - PKC 2003, PROCEEDINGS-
dc.citation.volume2567-
dc.contributor.affiliatedAuthorCha, JC-
dc.description.journalClass1-
dc.description.journalClass1-
dc.description.wostc379-
dc.type.docTypeArticle; Proceedings Paper-
dc.subject.keywordAuthorID-based signature-
dc.subject.keywordAuthorCDH group-
dc.subject.keywordAuthorelliptic curve-
dc.subject.keywordAuthorWeil pairing-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-

qr_code

  • mendeley

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher

차재춘CHA, JAE CHOON
Dept of Mathematics
Read more

Views & Downloads

Browse