File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1007/11554868_8
- Scopus: eid_2-s2.0-33646180805
- Find via
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Identity based delegation network
Title | Identity based delegation network |
---|---|
Authors | |
Keywords | Batch verification Bilinear pairings Delegation network Identity-based cryptography Proxy signature |
Issue Date | 2005 |
Publisher | Springer Verlag. The Journal's web site is located at http://springerlink.com/content/105633/ |
Citation | Lecture Notes In Computer Science (Including Subseries Lecture Notes In Artificial Intelligence And Lecture Notes In Bioinformatics), 2005, v. 3715 LNCS, p. 99-115 How to Cite? |
Abstract | Delegation of authorities is a common practice in various organizations. The way delegation is performed can be quite complicated. To capture possible delegation structures, the concept of delegation network is proposed, so that anyone can be convinced of who obtained delegation from whom in order to produce the final proxy signature. In this paper, we consider the delegation network for identity-based (ID-based) scenario. Since the public key is just a string denoting the user's identity, certificate management is simplified. Proxy signature schemes have been devised to delegate signing authorities. We show that a trivial attempt of extending an existing ID-based proxy signature may result in an insecure scheme. After that we propose a building block of our ID-based delegation network, which is an ID-based proxy signature supporting batch verifications. Our proposed ID-based delegation network is flexible in the sense that the whole delegation network does not need to be known in advance. Our proposal is provably secure under the random oracle model. © Springer-Verlag Berlin Heidelberg 2005. |
Persistent Identifier | http://hdl.handle.net/10722/93227 |
ISSN | 2023 SCImago Journal Rankings: 0.606 |
References |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chow, SSM | en_HK |
dc.contributor.author | Lui, RWC | en_HK |
dc.contributor.author | Hui, LCK | en_HK |
dc.contributor.author | Yiu, SM | en_HK |
dc.date.accessioned | 2010-09-25T14:54:44Z | - |
dc.date.available | 2010-09-25T14:54:44Z | - |
dc.date.issued | 2005 | en_HK |
dc.identifier.citation | Lecture Notes In Computer Science (Including Subseries Lecture Notes In Artificial Intelligence And Lecture Notes In Bioinformatics), 2005, v. 3715 LNCS, p. 99-115 | en_HK |
dc.identifier.issn | 0302-9743 | en_HK |
dc.identifier.uri | http://hdl.handle.net/10722/93227 | - |
dc.description.abstract | Delegation of authorities is a common practice in various organizations. The way delegation is performed can be quite complicated. To capture possible delegation structures, the concept of delegation network is proposed, so that anyone can be convinced of who obtained delegation from whom in order to produce the final proxy signature. In this paper, we consider the delegation network for identity-based (ID-based) scenario. Since the public key is just a string denoting the user's identity, certificate management is simplified. Proxy signature schemes have been devised to delegate signing authorities. We show that a trivial attempt of extending an existing ID-based proxy signature may result in an insecure scheme. After that we propose a building block of our ID-based delegation network, which is an ID-based proxy signature supporting batch verifications. Our proposed ID-based delegation network is flexible in the sense that the whole delegation network does not need to be known in advance. Our proposal is provably secure under the random oracle model. © Springer-Verlag Berlin Heidelberg 2005. | en_HK |
dc.language | eng | en_HK |
dc.publisher | Springer Verlag. The Journal's web site is located at http://springerlink.com/content/105633/ | en_HK |
dc.relation.ispartof | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | en_HK |
dc.subject | Batch verification | en_HK |
dc.subject | Bilinear pairings | en_HK |
dc.subject | Delegation network | en_HK |
dc.subject | Identity-based cryptography | en_HK |
dc.subject | Proxy signature | en_HK |
dc.title | Identity based delegation network | en_HK |
dc.type | Conference_Paper | en_HK |
dc.identifier.email | Hui, LCK:hui@cs.hku.hk | en_HK |
dc.identifier.email | Yiu, SM:smyiu@cs.hku.hk | en_HK |
dc.identifier.authority | Hui, LCK=rp00120 | en_HK |
dc.identifier.authority | Yiu, SM=rp00207 | en_HK |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1007/11554868_8 | en_HK |
dc.identifier.scopus | eid_2-s2.0-33646180805 | en_HK |
dc.identifier.hkuros | 122079 | en_HK |
dc.relation.references | http://www.scopus.com/mlt/select.url?eid=2-s2.0-33646180805&selection=ref&src=s&origin=recordpage | en_HK |
dc.identifier.volume | 3715 LNCS | en_HK |
dc.identifier.spage | 99 | en_HK |
dc.identifier.epage | 115 | en_HK |
dc.publisher.place | Germany | en_HK |
dc.identifier.scopusauthorid | Chow, SSM=8980575500 | en_HK |
dc.identifier.scopusauthorid | Lui, RWC=8980575800 | en_HK |
dc.identifier.scopusauthorid | Hui, LCK=8905728300 | en_HK |
dc.identifier.scopusauthorid | Yiu, SM=7003282240 | en_HK |
dc.identifier.issnl | 0302-9743 | - |