ID-based distributed "magic ink" signature from pairings

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 448
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorXie, Yanko
dc.contributor.authorZhang, Fangguoko
dc.contributor.authorChen, Xiaofengko
dc.contributor.authorKim, Kwangjoko
dc.date.accessioned2013-03-05T03:20:54Z-
dc.date.available2013-03-05T03:20:54Z-
dc.date.created2012-02-06-
dc.date.created2012-02-06-
dc.date.issued2003-
dc.identifier.citationINFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2836, pp.249 - 259-
dc.identifier.issn0302-9743-
dc.identifier.urihttp://hdl.handle.net/10203/85251-
dc.description.abstractThe advantage of ID-based system is the simplification of key distribution and certification management; a user can directly use his identity as his public key instead of an arbitrary number, thus at the same time he can prove his identity rather than providing a certificate from CA. Now a revocable blind signature is becoming more practical; because a complete anonymity can be abused in real world applications. For instance the perfect crime concern in e-cash system. The "magic ink" signature provides a revocable anonymity solution, which means that the signer has some capability to revoke a blind signature to investigate the original user in case of abnormal activity, while keeping the legal user's privacy anonymous. A single signer in "magic ink" signature can easily trace the original user of the message without any limitation; this scheme can't satisfy anonymity for a legal user, so we can use n signers to sign the message through a (n, n) threshold secret sharing to distribute the commitment during the signature procedure, single signer's revocability is limited, only under the agreement and cooperation of a set of n singers, the user's identity can be discovered. In this paper an ID-based (n, n) threshold "magic ink" signature is proposed along with its analysis and application.-
dc.languageEnglish-
dc.publisherSPRINGER-VERLAG BERLIN-
dc.titleID-based distributed "magic ink" signature from pairings-
dc.typeArticle-
dc.identifier.wosid000187421100023-
dc.identifier.scopusid2-s2.0-0142187798-
dc.type.rimsART-
dc.citation.volume2836-
dc.citation.beginningpage249-
dc.citation.endingpage259-
dc.citation.publicationnameINFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE-
dc.contributor.localauthorKim, Kwangjo-
dc.contributor.nonIdAuthorXie, Yan-
dc.contributor.nonIdAuthorZhang, Fangguo-
dc.contributor.nonIdAuthorChen, Xiaofeng-
dc.type.journalArticleArticle; Proceedings Paper-
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0