2008
DOI: 10.1016/j.ins.2008.06.022
|View full text |Cite
|
Sign up to set email alerts
|

Efficient generic on-line/off-line (threshold) signatures without key exposure

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0

Year Published

2009
2009
2021
2021

Publication Types

Select...
8

Relationship

2
6

Authors

Journals

citations
Cited by 48 publications
(28 citation statements)
references
References 19 publications
(28 reference statements)
0
28
0
Order By: Relevance
“…This section presents the proposed access control method based on the chameleon hash function [9][10][11][12] and used twice Diffie-Hellman key exchange. This study used signature parameter to archive robust authentication and key exchange.…”
Section: The Proposed Schemementioning
confidence: 99%
See 2 more Smart Citations
“…This section presents the proposed access control method based on the chameleon hash function [9][10][11][12] and used twice Diffie-Hellman key exchange. This study used signature parameter to archive robust authentication and key exchange.…”
Section: The Proposed Schemementioning
confidence: 99%
“…This study is constructed of security chameleon hash function, and further proof is in [10,11]. For example, if nodes and require mutual authentication, will first compare the preloaded chameleon hash value of the base station, CH BS , with the chameleon hash value of node , CH BS , obtained by using (1).…”
Section: Security Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…They mentioned that this phenomena is undesirable in applications in which the pair of collisions will be released eventually and introduced identity-based chameleon hash [37] to solve the problem. Subsequently, many novel chameleon hash schemes without the key-exposure problem were proposed such as in [38,37,39,40].…”
Section: Related Workmentioning
confidence: 99%
“…Meanwhile, it disallows the creation of a valid signature if fewer than t parties participate in the protocol [3,13]. Based on the secret sharing schemes and threshold cryptosystems, Zhang [17] and Kim et al [8] proposed threshold proxy signature schemes, respectively.…”
Section: Introductionmentioning
confidence: 99%