Proxy Management Protocol for based on Verifier for Efficient Proxy Signature 


Vol. 31,  No. 1, pp. 93-101, Jan.  2006


PDF
  Abstract

Proxy signature schemes based on delegation of warrant are frequently studied in these days. Proxy signature schemes that used in these days have some problems about the security. Especially, it is difficult to prevent misuse of certification and private key.
In this thesis, we propose the more stronger security structure by turning the point from original signer with proxy signer to original signer with verifier, and the proposed protocol is more stronger than previous scheme and can be applied to various PKI based application.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

S. Park, Y. Lee, D. Oh, H. Oh, "Proxy Management Protocol for based on Verifier for Efficient Proxy Signature," The Journal of Korean Institute of Communications and Information Sciences, vol. 31, no. 1, pp. 93-101, 2006. DOI: .

[ACM Style]

Se-Joon Park, Yong-Joon Lee, Dong-Yeol Oh, and Hae-Seok Oh. 2006. Proxy Management Protocol for based on Verifier for Efficient Proxy Signature. The Journal of Korean Institute of Communications and Information Sciences, 31, 1, (2006), 93-101. DOI: .

[KICS Style]

Se-Joon Park, Yong-Joon Lee, Dong-Yeol Oh, Hae-Seok Oh, "Proxy Management Protocol for based on Verifier for Efficient Proxy Signature," The Journal of Korean Institute of Communications and Information Sciences, vol. 31, no. 1, pp. 93-101, 1. 2006.