Open Access System for Information Sharing

Login Library

 

Article
Cited 7 time in webofscience Cited 16 time in scopus
Metadata Downloads
Full metadata record
Files in This Item:
There are no files associated with this item.
DC FieldValueLanguage
dc.contributor.authorYum, DH-
dc.contributor.authorLee, PJ-
dc.date.accessioned2016-03-31T12:38:39Z-
dc.date.available2016-03-31T12:38:39Z-
dc.date.created2009-03-20-
dc.date.issued2003-01-
dc.identifier.issn0302-9743-
dc.identifier.other2004-OAK-0000003961-
dc.identifier.urihttps://oasis.postech.ac.kr/handle/2014.oak/18140-
dc.description.abstractTo mitigate the damage of secret key exposure, key updating signature schemes can be used such as a key-insulated signature scheme and an intrusion-resilient signature scheme. We propose efficient key updating signature schemes based on a secure identity-based signature (IBS) scheme. KUS-SKI is a strong (N - 1, N) key-insulated signature scheme with random-access key updates, and KUS-IR is a Type (1) intrusion-resilient signature scheme. We also provide an equivalence theorem between a secure identity-based signature scheme and a strong (N - 1, N) key-insulated signature scheme with random-access key up-dates.-
dc.description.statementofresponsibilityX-
dc.languageEnglish-
dc.publisherSPRINGER-VERLAG BERLIN-
dc.relation.isPartOfLECTURE NOTES IN COMPUTER SCIENCE-
dc.subjectkey insulated signature-
dc.subjectintrusion resilient siganture-
dc.subjectidentity based signature-
dc.subjectIDENTITY-BASED SIGNATURE-
dc.subjectPAIRINGS-
dc.titleEfficient key updating signature schemes based on IBS-
dc.typeArticle-
dc.contributor.college전자전기공학과-
dc.identifier.doi10.1007/978-3-540-40974-8_14-
dc.author.googleYum, DH-
dc.author.googleLee, PJ-
dc.relation.volume2898-
dc.relation.startpage167-
dc.relation.lastpage182-
dc.contributor.id10051689-
dc.relation.journalLECTURE NOTES IN COMPUTER SCIENCE-
dc.relation.indexSCI급, SCOPUS 등재논문-
dc.relation.sciSCIE-
dc.collections.nameConference Papers-
dc.type.rimsART-
dc.identifier.bibliographicCitationLECTURE NOTES IN COMPUTER SCIENCE, v.2898, pp.167 - 182-
dc.identifier.wosid000188182400014-
dc.date.tcdate2019-01-01-
dc.citation.endPage182-
dc.citation.startPage167-
dc.citation.titleLECTURE NOTES IN COMPUTER SCIENCE-
dc.citation.volume2898-
dc.contributor.affiliatedAuthorLee, PJ-
dc.identifier.scopusid2-s2.0-33749423236-
dc.description.journalClass1-
dc.description.journalClass1-
dc.description.wostc4-
dc.type.docTypeArticle; Proceedings Paper-
dc.subject.keywordAuthorkey insulated signature-
dc.subject.keywordAuthorintrusion resilient siganture-
dc.subject.keywordAuthoridentity based signature-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.relation.journalWebOfScienceCategoryMathematics-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaMathematics-

qr_code

  • mendeley

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher

이필중LEE, PIL JOONG
Dept of Electrical Enginrg
Read more

Views & Downloads

Browse