Method of Anti-Virus Protection Based on (n, t) Threshold Proxy Signature with an Arbitrator
https://doi.org/10.18255/1818-1015-2014-2-5-14
Abstract
About the Author
E. A. TolyupaRussian Federation
аспирант,
Sovetskaya str., 14, Yaroslavl, 150000, Russia
References
1. http://letitbit.org/terms/
2. Mambo M., Usuda K., Okamoto E. Proxy signatures: Delegation of the power to sign messages // IEICE Trans. Fundamentals. 1996. V. E79-A. No. 9. P. 1338–1353.
3. Mambo M., Usuda K., Okamoto E. Proxy signatures for delegating signing operation // Proc. of 3rd ACM Conference on Computer and Communications Security (CCS’96). ACM Press, 1996. P. 48–57.
4. Kim S., Park S., Won D. Proxy signatures, revisited // Information and Communications Security (ICICS’97). LNCS 1334. Springer-Verlag, 1997. P. 223–232.
5. Lee B., Kim H., Kim K. Strong proxy signature and its applications // Proceedings of the 2001 Symposium on Cryptography and Information Security (SCIS’01), Vol. 2/2. Oiso, Japan, Jan. 23–26, 2001. P. 603–608.
6. Толюпа Е.А. Алгоритм (n, t)-пороговой доверенной цифровой подписи с Арбитром // Моделирование и анализ информационных систем. 2013. Т. 20, №4. C. 55–70. [Tolyupa E.A. An Algorithm of (n; t)-Threshold Proxy Signature with an Arbitrator // Modeling and analysis of information systems. 2013. V. 20, No 4. P. 55–70 (in Russian)].
7. Kaufman C., Perlman R., Speciner M. Network Security: Private Communication in a Public World. Prentice-Hall PTR, 2002.
8. Горбатов В. С , Полянская О. Ю. Основы технологии PKI. М.: Горячая линия — Телеком, 2004. [Gorbatov V. S , Polyanskaya O. Yu. Osnovy tekhnologii PKI. M.: Goryachaya liniya — Telekom, 2004 (in Russian)].
9. Cooper M., Dzambasow Y., Hesse P., Joseph S., Nicholas R. Internet X.509 Public Key Infrastructure: Certification Path Building, RFC 4158, September 2005.
10. Федеральный закон об электронной подписи № 169-ФЗ от 01.07.2011 [Federalnyy zakon ob elektronnoy podpisi № 169-FZ ot 01.07.2011 (in Russian)].
11. Lee J.-Y., Cheon J.-H., Kim S. An analysis of proxy signatures: Is a secure channel necessary? // LNCS. 2003. V. 2612. P. 68–79.
12. Wang G., Bao F., Zhou J., Deng R. H.. Security Analysis of Some Proxy Signatures // Proc. Information Security and Cryptology – ICISC. 2003. LNCS 2971. Springer-Verlag, 2004. P. 305–319.
13. Алферов А.П., Зубов А.Ю., Кузьмин А.С., Черемушкин А.В. Основы криптографии. М.: Гелиос АРВ, 2002. [Alferov A.P., Zubov A.Yu., Kuzmin A.S., Cheremushkin A.V. Osnovy kriptografii. M.: Gelios ARV, 2002 (in Russian)].
Review
For citations:
Tolyupa E.A. Method of Anti-Virus Protection Based on (n, t) Threshold Proxy Signature with an Arbitrator. Modeling and Analysis of Information Systems. 2014;21(2):5-14. (In Russ.) https://doi.org/10.18255/1818-1015-2014-2-5-14