Scalable Hierarchical Identity-based Signature Scheme from Lattices
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Noh, Geontae | - |
dc.contributor.author | Jeong, Ik Rae | - |
dc.date.accessioned | 2021-09-05T17:49:58Z | - |
dc.date.available | 2021-09-05T17:49:58Z | - |
dc.date.created | 2021-06-15 | - |
dc.date.issued | 2013-12-29 | - |
dc.identifier.issn | 1976-7277 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/101262 | - |
dc.description.abstract | In the paper, we propose a novel adaptively secure hierarchical identity-based signature scheme from lattices. The size of signatures in our scheme is shortest among the existing hierarchical identity-based signature schemes from lattices. Our scheme is motivated by Gentry et al.'s signature scheme and Agrawal et al.'s hierarchical identity-based encryption scheme. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | KSII-KOR SOC INTERNET INFORMATION | - |
dc.subject | EFFICIENT | - |
dc.subject | TRAPDOORS | - |
dc.title | Scalable Hierarchical Identity-based Signature Scheme from Lattices | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Jeong, Ik Rae | - |
dc.identifier.doi | 10.3837/tiis.2013.12.017 | - |
dc.identifier.scopusid | 2-s2.0-84891599648 | - |
dc.identifier.wosid | 000333157700016 | - |
dc.identifier.bibliographicCitation | KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, v.7, no.12, pp.3261 - 3273 | - |
dc.relation.isPartOf | KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS | - |
dc.citation.title | KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS | - |
dc.citation.volume | 7 | - |
dc.citation.number | 12 | - |
dc.citation.startPage | 3261 | - |
dc.citation.endPage | 3273 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.identifier.kciid | ART002051011 | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.description.journalRegisteredClass | kci | - |
dc.description.journalRegisteredClass | other | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | EFFICIENT | - |
dc.subject.keywordPlus | TRAPDOORS | - |
dc.subject.keywordAuthor | Hierarchical identity-based signatures | - |
dc.subject.keywordAuthor | adaptive identity security | - |
dc.subject.keywordAuthor | strong unforgeability | - |
dc.subject.keywordAuthor | lattice-based cryptography | - |
dc.subject.keywordAuthor | provable security | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
145 Anam-ro, Seongbuk-gu, Seoul, 02841, Korea+82-2-3290-2963
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.