Open Access System for Information Sharing

Login Library

 

Article
Cited 3 time in webofscience Cited 5 time in scopus
Metadata Downloads
Full metadata record
Files in This Item:
There are no files associated with this item.
DC FieldValueLanguage
dc.contributor.authorEUNSUNG, LEE-
dc.contributor.authorKim, Sang Woo-
dc.date.accessioned2019-02-25T04:11:41Z-
dc.date.available2019-02-25T04:11:41Z-
dc.date.created2019-01-16-
dc.date.issued2018-12-
dc.identifier.issn0010-4620-
dc.identifier.urihttps://oasis.postech.ac.kr/handle/2014.oak/94669-
dc.description.abstractProxy re-signature allows a semi-trusted proxy to transform a delegatee's signature on a message into a delegator's signature on the same message. To transform a signature, the proxy uses a re-signature key that is received from the delegator. Once the proxy has received the re-signature key, the proxy can transform all the delegatee's signatures to the delegator's signatures; this process is undesirable in some applications that require a fine-grained delegation. To overcome this limitation of proxy re-signature schemes, the concept of conditional proxy re-signature was proposed. It provides fine-grained delegation, by which a re-signature key can be used to transform a signature on a message with a specific condition. To the best of our knowledge, two conditional proxy re-signature schemes have been proposed, but neither is proved in the standard model. We propose a non-interactive conditional proxy re-signature scheme in the standard model. In the proposed scheme, a delegator can choose a condition and can non-interactively generate a re-signature key even if a delegatee is off-line. Therefore, the delegator can fully control a delegation process. Our scheme is existentially unforgeable against adaptive chosen message attack and adaptive chosen condition attack.-
dc.languageEnglish-
dc.publisherOxford University Press-
dc.relation.isPartOfComputer Journal-
dc.titleNon-interactive Conditional Proxy Re-Signature in the Standard Model-
dc.typeArticle-
dc.identifier.doi10.1093/comjnl/bxy036-
dc.type.rimsART-
dc.identifier.bibliographicCitationComputer Journal, v.61, no.12, pp.1772 - 1782-
dc.identifier.wosid000453394000002-
dc.citation.endPage1782-
dc.citation.number12-
dc.citation.startPage1772-
dc.citation.titleComputer Journal-
dc.citation.volume61-
dc.contributor.affiliatedAuthorEUNSUNG, LEE-
dc.contributor.affiliatedAuthorKim, Sang Woo-
dc.identifier.scopusid2-s2.0-85058779891-
dc.description.journalClass1-
dc.description.journalClass1-
dc.description.isOpenAccessN-
dc.type.docTypeArticle-
dc.subject.keywordAuthorproxy re-signature-
dc.subject.keywordAuthorconditional delegation-
dc.subject.keywordAuthorstandard model-
dc.subject.keywordAuthornon-interactive-
dc.relation.journalWebOfScienceCategoryComputer Science, Hardware & Architecture-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryComputer Science, Software Engineering-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-

qr_code

  • mendeley

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher

김상우KIM, SANG WOO
Dept of Electrical Enginrg
Read more

Views & Downloads

Browse