Skip to main content

A Digital Nominative Proxy Signature Scheme for Mobile Communication

  • Conference paper
  • First Online:
Information and Communications Security (ICICS 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2229))

Included in the following conference series:

Abstract

Based on the development of mobile communication, the future mobile communication systems are expected to provide higher quality of multimedia services for users than today’s systems. Therefore, many technical factors are needed in this systems. Especially the secrecy and the safety would be obtained through the introduction of the security for mobile communication. In this paper, we presents a digital nominative proxy signature scheme that processes a user’s digital signature and encryption using the proxy-agent who has more computational power than origins in mobile communication.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. ETSI ETS GSM 02.09, “European Digital Cellular Telecommunications System (Phase 2); Security Aspects,” Version 4.2.4, September 1994.

    Google Scholar 

  2. ETSI ETS 3000175-7, “DECT Common Interface, Part 7: Security Features,” October 1992.

    Google Scholar 

  3. UMTS Forum, “A regulatory framework for UMTS,” Report no. 1, 1997.

    Google Scholar 

  4. ETSI ETR 33.20, “Security Principles for UMTS,” Draft 1, 1997.

    Google Scholar 

  5. ITU, “Security Principles for Future Public Land Mobile Telecommunication Systems,” Rec. ITU-R M. 1998.

    Google Scholar 

  6. Y. Zheng, “Signcryption and Its Applications in Efficient Public Key Solutions,” Proc. ISW’97, LNCS 1397, pp.291–312, 1998.

    Google Scholar 

  7. S. J. Kim, S. J. Park and D. H. Won, “Nominative Signatures,” Proc. ICEIC’ 95, pp.II–68–II–71, 1995.

    Google Scholar 

  8. M. Mambo, K. Usuda and E. Okamoto, “Proxy Signatures,” Proceedings of SCIS 95, pp.B1.1.1–17, 4-27 Jan, 1995.

    Google Scholar 

  9. M. Mambo, K. Usuda and E. Okamoto, “Proxy signatures for delegating signing operation,” Proc. Third ACM Conference on Computer and Communications Security, pp.48–57, 1996.

    Google Scholar 

  10. C. Gamage, J. Leiwo and Y. Zheng, “An Efficient Scheme for Secure Message Transmission using Proxy-Signcryption,” Proceeding of the Twenty Second Australasian Computer Science Conference, 18–21 Jan, 1999.

    Google Scholar 

  11. H. U. Park and I, Y. Lee, “A 2-pass key agreement and authentication for mobile communication,” Proceedings of ICEIC 2000, pp.115–118, 2000.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Park, HU., Lee, IY. (2001). A Digital Nominative Proxy Signature Scheme for Mobile Communication. In: Qing, S., Okamoto, T., Zhou, J. (eds) Information and Communications Security. ICICS 2001. Lecture Notes in Computer Science, vol 2229. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45600-7_49

Download citation

  • DOI: https://doi.org/10.1007/3-540-45600-7_49

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42880-0

  • Online ISBN: 978-3-540-45600-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics