DC Field | Value | Language |
---|---|---|
dc.contributor.author | Xie, Yan | ko |
dc.contributor.author | Zhang, Fangguo | ko |
dc.contributor.author | Chen, Xiaofeng | ko |
dc.contributor.author | Kim, Kwangjo | ko |
dc.date.accessioned | 2013-03-05T03:20:54Z | - |
dc.date.available | 2013-03-05T03:20:54Z | - |
dc.date.created | 2012-02-06 | - |
dc.date.created | 2012-02-06 | - |
dc.date.issued | 2003 | - |
dc.identifier.citation | INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2836, pp.249 - 259 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | http://hdl.handle.net/10203/85251 | - |
dc.description.abstract | The advantage of ID-based system is the simplification of key distribution and certification management; a user can directly use his identity as his public key instead of an arbitrary number, thus at the same time he can prove his identity rather than providing a certificate from CA. Now a revocable blind signature is becoming more practical; because a complete anonymity can be abused in real world applications. For instance the perfect crime concern in e-cash system. The "magic ink" signature provides a revocable anonymity solution, which means that the signer has some capability to revoke a blind signature to investigate the original user in case of abnormal activity, while keeping the legal user's privacy anonymous. A single signer in "magic ink" signature can easily trace the original user of the message without any limitation; this scheme can't satisfy anonymity for a legal user, so we can use n signers to sign the message through a (n, n) threshold secret sharing to distribute the commitment during the signature procedure, single signer's revocability is limited, only under the agreement and cooperation of a set of n singers, the user's identity can be discovered. In this paper an ID-based (n, n) threshold "magic ink" signature is proposed along with its analysis and application. | - |
dc.language | English | - |
dc.publisher | SPRINGER-VERLAG BERLIN | - |
dc.title | ID-based distributed "magic ink" signature from pairings | - |
dc.type | Article | - |
dc.identifier.wosid | 000187421100023 | - |
dc.identifier.scopusid | 2-s2.0-0142187798 | - |
dc.type.rims | ART | - |
dc.citation.volume | 2836 | - |
dc.citation.beginningpage | 249 | - |
dc.citation.endingpage | 259 | - |
dc.citation.publicationname | INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE | - |
dc.contributor.localauthor | Kim, Kwangjo | - |
dc.contributor.nonIdAuthor | Xie, Yan | - |
dc.contributor.nonIdAuthor | Zhang, Fangguo | - |
dc.contributor.nonIdAuthor | Chen, Xiaofeng | - |
dc.type.journalArticle | Article; Proceedings Paper | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.