期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
Robust Threshold Guillou-Quisquater Signature Scheme 被引量:4
1
作者 WANGHong ZHANGZhen-feng FENGdeng-guo 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期207-210,共4页
The deficiencies of the first threshold Guilbu-Quisquater signature schemepresented by Li-San Liu, Cheng-Kang Chu and Wen-Guey Tzeng arc analysiscd at first, and then a newthreshold Guillou-Quisquater signature scheme... The deficiencies of the first threshold Guilbu-Quisquater signature schemepresented by Li-San Liu, Cheng-Kang Chu and Wen-Guey Tzeng arc analysiscd at first, and then a newthreshold Guillou-Quisquater signature scheme is presented. The new scheme isunforgeable and robustagainst any adaptive adversary if the base Guillou-Quisquater signature scheme is unforgeable underthe chosen message attack and computing the discrete logarithm modulo a prime is hard This schemecan also achieve optimal resilience. However, the new scheme does not need the assumption that N isthe product of two safe primes. The basie signature scheme underlying the new scheme is exactlyGuillou-Quisqualtr signature scheme, and the additional strong computation assumption introduced bythe first threshold Guillou-Quisquater scheme is weaken. 展开更多
关键词 vcriablc secret sharing threshold cryptography digital signature scheme ROBUST secure multiparty computation
下载PDF
Secure mediated certificateless signature scheme 被引量:4
2
作者 YANG Chen MA Wen-ping WANG Xin-mei 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2007年第2期75-78,共4页
Ju et al. proposed a certificateless signature scheme with instantaneous revocation by introducing security mediator (SEM) mechanism. This article presents a detailed cryptoanalysis of this scheme and shows that, in... Ju et al. proposed a certificateless signature scheme with instantaneous revocation by introducing security mediator (SEM) mechanism. This article presents a detailed cryptoanalysis of this scheme and shows that, in their proposed scheme, once a valid signature has been produced, the signer can recover his private key information and the instantaneous revocation property will be damaged. Furthermore, an improved mediated signature scheme, which can eliminate these disadvantages, is proposed, and security proof of the improved scheme under elliptic curve factorization problem (ECFP) assumption and bilinear computational diffie-hellman problem (BCDH) assumption is also proposed. 展开更多
关键词 CERTIFICATELESS signature scheme bilinear pairing security mediator
原文传递
Improved lattice-based ring signature schemes from basis delegation 被引量:1
3
作者 Gao Wen Hu Yupu +1 位作者 Wang Baocang Xie Jia 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2016年第3期11-17,28,共8页
Ring signature enables the members to sign anonymously without a manager, it has many online applications, such as e-voting, e-money, whistle blowing etc. As a promising post-quantum candidate, lattice-based cryptogra... Ring signature enables the members to sign anonymously without a manager, it has many online applications, such as e-voting, e-money, whistle blowing etc. As a promising post-quantum candidate, lattice-based cryptography attracts much attention recently. Several efficient lattice-based ring signatures have been naturally constructed from lattice basis delegation, but all of them have large verification key sizes. Our observation finds that a new concept called the split- small integer solution (SIS) problem introduced by Nguyen et al. at PKC'I 5 is excellent in reducing the public key sizes of lattice-based ring signature schemes from basis delegation. In this research, we first define an extended concept called the extended split-SIS problem, and then prove that the hardness of the extended problem is as hard as the approximating shortest independent vectors problem (SIVP) problem within certain polynomial factor. Moreover, we present an improved ring signature and prove that it is anonymous and unforgeable against the insider corruption. Finally, we give two other improved existing ring signature schemes from lattices. In the end, we show the comparison with the original scheme in terms of the verification key sizes. Our research data illustrate that the public key sizes of the proposed schemes are reduced significantly. 展开更多
关键词 lattice-based ring signature scheme ANONYMOUS unforgeable
原文传递
Stateless Transitive Signature Schemes 被引量:1
4
作者 MAChun-guang CAIMan-chun YANGYi-xian 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2004年第4期43-47,共5页
A new practical method is introduced to transform the stateful transitive signature scheme to stateless one with-out the loss of security.According to the approach,two concrete stateless transitive signature schemes b... A new practical method is introduced to transform the stateful transitive signature scheme to stateless one with-out the loss of security.According to the approach,two concrete stateless transitive signature schemes based on Factoringand RSA are presented respectively.Under the assumption of the hardness of factoring and one-more-RSA-inversion prob-lem,both two schemes are secure under the adaptive chosen-message attacks in random oracle model. 展开更多
关键词 stateless signature transitive signature scheme one-more-RSA-inversion random oracle model
原文传递
A new threshold proxy signature scheme from bilinear pairings 被引量:7
5
作者 QIANHaifeng CAOZhenfu XUEQingshui 《Science in China(Series F)》 2004年第5期612-622,共11页
关键词 probabilistic signature scheme threshold proxy signature VSS bilinear pairings.
原文传递
Efficient ID-based proxy multi-signature scheme secure in random oracle 被引量:1
6
作者 Rajeev Anand SAHU Sahadeo PADHYE 《Frontiers of Computer Science》 SCIE EI CSCD 2012年第4期421-428,共8页
Proxy signature schemes enable an entity to del- egate its signing rights to any other party, called proxy signer. As a variant of proxy signature primitive, proxy multi- signature allows a group of original signers t... Proxy signature schemes enable an entity to del- egate its signing rights to any other party, called proxy signer. As a variant of proxy signature primitive, proxy multi- signature allows a group of original signers to delegate their signing capabilities to a single proxy signer in such a way that the proxy signer can sign a message on behalf of the group of original signers. We propose a concrete ID-based proxy multi-signature scheme from bilinear pairings. The proposed scheme is existential unforgeable against adaptively chosen message and given ID-attack in random oracle model under the computational Diltie-Hellman (CDH) assumption. The fascinating property of new scheme is that the size of a proxy multi-signature is independent of the number of original sign- ers. Furthermore the proposed scheme is simple and com- putationally more efficient than other ID-based proxy multi- signature schemes. 展开更多
关键词 ID-based signature scheme bilinear pairings proxy multi-signature computational Diffie-Hellman prob-lem (CDHP) random oracle
原文传递
An Efficient Threshold Blind Signature from Weil Pairing
7
作者 CHENGXiang-guo XUWei-dong WANGXin-mei 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期255-258,共4页
Threshold blind signature is playing an important role in cryptography as well as in practical applications such as e-cash and e-voting systems, etc. In this paper, we present an efficient and practical threshold bind... Threshold blind signature is playing an important role in cryptography as well as in practical applications such as e-cash and e-voting systems, etc. In this paper, we present an efficient and practical threshold bind signature from Weil pairing on super-singular elliptic curves or hyper-elliptic curves over finite field and prove that our scheme is provably secure in the random oracle model. 展开更多
关键词 signature scheme threshold blind signature Weil pairing GDH group
下载PDF
Certificateless network coding proxy signatures from lattice
8
作者 Huifang YU Ning WANG 《Frontiers of Computer Science》 SCIE EI CSCD 2023年第5期145-152,共8页
Network coding can improve the information transmission efficiency and reduces the network resource consumption,so it is a very good platform for information transmission.Certificateless proxy signatures are widely ap... Network coding can improve the information transmission efficiency and reduces the network resource consumption,so it is a very good platform for information transmission.Certificateless proxy signatures are widely applied in information security fields.However,certificateless proxy signatures based on classical number theory are not suitable for the network coding environment and cannot resist the quantum computing attacks.In view of this,we construct certificateless network coding proxy signatures from lattice(LCL-NCPS).LCL-NCPS is new multi-source signature scheme which has the characteristics of anti-quantum,antipollution and anti-forgery.In LCL-NCPS,each source node user can output a message vector to intermediate node and sink node,and the message vectors from different source nodes will be linearly combined to achieve the aim of improving the network transmission rate and network robustness.In terms of efficiency analysis of space dimension,LCL-NCPS can obtain the lower computation complexity by reducing the dimension of proxy key.In terms of efficiency analysis of time dimension,LCL-NCPS has higher computation efficiency in signature and verification. 展开更多
关键词 LATTICE multi-source signature scheme proxy signature post-quantum
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部