完整後設資料紀錄
DC 欄位語言
dc.contributor.authorYen, Sung-Ming
dc.contributor.authorHung, Chung-Pei
dc.contributor.authorLee, Yi-Yuan
dc.date.accessioned2009-06-02T06:19:22Z
dc.date.accessioned2020-05-25T06:38:18Z-
dc.date.available2009-06-02T06:19:22Z
dc.date.available2020-05-25T06:38:18Z-
dc.date.issued2006-10-27T06:38:47Z
dc.date.submitted2000-12-08
dc.identifier.urihttp://dspace.lib.fcu.edu.tw/handle/2377/2701-
dc.description.abstractIn 1996, a new category of signature scheme called a proxy signature was proposed by Mambo, Usuda, and Okamoto. The proxy signature scheme allows a des- ignated person, called a proxy signer, to sign on be- half of an original signer. In Mambo's paper, one kind of cryptanalysis on their scheme was considered. In this paper, it will be shown that the reported attack in Mambo's paper is not practical and a simple counter- measure can be easily developed. The proxy signature scheme plays the role in many practical applications and receives great attention after it was proposed. In 1999, Sung and Hsieh developed an enhanced version of proxy signature scheme. However, it will be proven that the Sung-Hsieh scheme is not secure. A simple modied version will be suggested.
dc.description.sponsorship中正大學,嘉義縣
dc.format.extent6p.
dc.format.extent201986 bytes
dc.format.mimetypeapplication/pdf
dc.language.isozh_TW
dc.relation.ispartofseries2000 ICS會議
dc.subject.otherCryptanalysis
dc.titleRemarks on Some Proxy Signature Schemes
分類:2000年 ICS 國際計算機會議

文件中的檔案:
檔案 描述 大小格式 
ce07ics002000000088.pdf197.25 kBAdobe PDF檢視/開啟


在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。