View : 197 Download: 0

Full metadata record

DC FieldValueLanguage
dc.contributor.author임선간-
dc.date.accessioned2017-08-29T05:04:45Z-
dc.date.available2017-08-29T05:04:45Z-
dc.date.issued2011-
dc.identifier.issn1816-353X-
dc.identifier.urihttp://dspace.ewha.ac.kr/handle/2015.oak/231270-
dc.description.abstractBatch cryptography has been developed into two main branches - batch verification and batch identification. Batch verification is a method to determine whether a set of signatures contains invalid signatures, and batch identification is a method to find bad signatures if a set of signatures contains invalid signatures. Recently, some significant developments appeared in such field, especially by Ferrara et al. [10] and Law et al. [15], respectively. However, no batch identification method for group signa-ture have been suggested. In this paper, by exploiting earlier works on standard signature schemes, we propose methods of batch verification and batch identification of a group signature scheme.-
dc.languageEnglish-
dc.titleBatch verification and finding invalid signatures in a group signature scheme-
dc.typeArticle-
dc.relation.issue2-
dc.relation.volume13-
dc.relation.indexSCOPUS-
dc.relation.startpage61-
dc.relation.lastpage70-
dc.relation.journaltitleInternational Journal of Network Security-
dc.identifier.scopusid2-s2.0-80054061233-
dc.author.googleKim K.-
dc.author.googleYie I.-
dc.author.googleLim S.-
dc.author.googleNyang D.-
dc.contributor.scopusid임선간(56291562000;7404081692)-
dc.date.modifydate20180104081001-
Appears in Collections:
연구기관 > 수리과학연구소 > Journal papers
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE