Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
One-time proxy signatures revisited
Date
2007-05-01
Author
Bicakci, Kemal
Metadata
Show full item record
This work is licensed under a
Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License
.
Item Usage Stats
146
views
0
downloads
Cite This
Proxy signatures are useful constructions in grid computing, mobile agents and many other emerging applications. In a recent work [Huaxiong Wang and Josef Pieprzyk: Efficient One-Time Proxy Signatures. Proc. ASIACRYPT'03, LNCS 2894, Springer 2003.], Wang and Pieprzyk proposed a one-time signature scheme which allows full delegation to a proxy with an added feature that allows tracing the authorship of the signature in case of a dispute. In this paper we present a simple alternative approach that eliminates public-key cryptography in key generation, offers certainty and simplicity in the dispute resolution and avoids swallow attacks. We also introduce the concept of 1-out-of-n threshold traceable one-time signatures as an efficiency improvement.
Subject Keywords
Hardware and Architecture
,
Software
,
Law
URI
https://hdl.handle.net/11511/63733
Journal
COMPUTER STANDARDS & INTERFACES
DOI
https://doi.org/10.1016/j.csi.2006.12.001
Collections
Graduate School of Informatics, Article
Suggestions
OpenMETU
Core
A process capability based assessment model for software workforce in emergent software organizations
TANRIÖVER, ÖMER ÖZGÜR; Demirörs, Onur (Elsevier BV, 2015-01-01)
Software process improvement frameworks for software organizations enable to identify opportunities for improving the processes as well as establishing road maps for improvement. However, software process improvement practice showed that to achieve a sustained, leveraged state, software organizations need to focus on the workforce as much as the process. Software process improvement frameworks address the people dimension indirectly through processes. To complement process assessment models/methods, there i...
Cognitive routing protocol for disaster-inspired Internet of Things
Ai-Turjman, Fadi (Elsevier BV, 2019-03-01)
In this paper, we propose a framework for data delivery in large-scale networks for disaster management, where numerous wireless sensors are distributed over city traffic-infrastructures, shopping-malls' parking areas, airports' facilities, etc. In general, our framework caters for energy-efficient applications in the Internet of Things (IoT) where data is propagated via relays from diverse sensor-nodes towards a gateway connected to a large-scale network such as the Internet. We consider the entire network...
Energy and buffer aware application mapping for networks-on-chip with self similar traffic
Celik, Coskun; Bazlamaçcı, Cüneyt Fehmi (Elsevier BV, 2013-11-01)
Networks-on-chip (NoC) is a promising on-chip communication paradigm that improves scalability and performance of System-on-Chips. NoC design flow contains many problems from different areas, such as networking, embedded design and computer architecture. Application mapping is one of these problems, which is generally considered in the form of a communication energy minimization problem. Self similarity is a traffic model that is used to characterize Ethernet and/or wide area network traffic, as well as on-...
A systematic approach to the integration of overlapping partitions in service-oriented data grids
Sunercan, H. Kevser; Alpdemir, M. Nedim; Çiçekli, Fehime Nihan (Elsevier BV, 2011-06-01)
This paper aims to provide a service-oriented data integration solution over data Grids for cases where distributed data sources are partitioned with overlapping sections of various proportions. This is an interesting variation which combines both replicated and partitioned data within the same data management framework. Thus, the data management infrastructure has to deal with specific challenges regarding the identification, access and aggregation of partitioned data with varying proportions of overlappin...
Improving pattern quality in web usage mining by using semantic information
Karagöz, Pınar (Springer Science and Business Media LLC, 2012-03-01)
Frequent Web navigation patterns generated by using Web usage mining techniques provide valuable information for several applications such as Web site restructuring and recommendation. In conventional Web usage mining, semantic information of the Web page content does not take part in the pattern generation process. In this work, we investigate the effect of semantic information on the patterns generated for Web usage mining in the form of frequent sequences. To this aim, we developed a technique and a fram...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
K. Bicakci, “One-time proxy signatures revisited,”
COMPUTER STANDARDS & INTERFACES
, pp. 499–505, 2007, Accessed: 00, 2020. [Online]. Available: https://hdl.handle.net/11511/63733.