자체인증 공개키를 사용하는 threshold 대리서명 기법의 안전성 분석
Vol. 15, No. 3, pp. 109-114,
6월.
2005
10.13089/JKIISC.2005.15.3.109,
Full Text:
Keywords: Proxy signature schemes, Proxy threshold signature scheme, Security analysis, public key cryptosystem
Abstract Statistics
Cite this article
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/pdficon_small.png)
Keywords: Proxy signature schemes, Proxy threshold signature scheme, Security analysis, public key cryptosystem
Abstract Statistics
Cite this article
[IEEE Style]
J. Park, B. Kang, S. Hahn, "Security analysis of a threshold proxy signature scheme using a self-certified public key," Journal of The Korea Institute of Information Security and Cryptology, vol. 15, no. 3, pp. 109-114, 2005. DOI: 10.13089/JKIISC.2005.15.3.109.
[ACM Style]
Je-Hong Park, Bo-Gyeong Kang, and Sang-Geun Hahn. 2005. Security analysis of a threshold proxy signature scheme using a self-certified public key. Journal of The Korea Institute of Information Security and Cryptology, 15, 3, (2005), 109-114. DOI: 10.13089/JKIISC.2005.15.3.109.