期刊文献+

二次检索

题名
关键词
文摘
作者
第一作者
机构
刊名
分类号
参考文献
作者简介
基金资助
栏目信息

年份

共找到2篇文章
< 1 >
每页显示 20 50 100
RING PROXY SIGNATURES 被引量:1
1
作者 Wei Baodian Zhang Fangguo Chen Xiaofeng 《Journal of Electronics(China)》 2008年第1期108-114,共7页
Proxy signatures have been used to enable the transfer of digital signing power within some context and ring signatures can be used to provide the anonymity of a signer. By combining the functionalities of proxy signa... Proxy signatures have been used to enable the transfer of digital signing power within some context and ring signatures can be used to provide the anonymity of a signer. By combining the functionalities of proxy signatures and ring signatures, this paper introduces a new concept, named ring proxy signature, which is a proxy signature generated by an anonymous member from a set of potential signers. The paper also constructs the first concrete ring proxy signature scheme based on the provably secure Schnorr's signatures and two ID-based ring proxy signature schemes. The security analysis is provided as well. 展开更多
关键词 Proxy signature Ring signature Ring proxy signature ID-based cryptography bilinear parings
下载PDF
A Signcryption Scheme Based on Self-Certified Cryptography
2
作者 LIU Zhiyuan CHEN Jing 《Wuhan University Journal of Natural Sciences》 CAS 2014年第2期169-172,共4页
Self-certified signcryption can remove key escrow problem and certification management problem. Based on Boneh and Boyen's short signature scheme, a secure self-certified sign- cryption scheme is proposed. Under the ... Self-certified signcryption can remove key escrow problem and certification management problem. Based on Boneh and Boyen's short signature scheme, a secure self-certified sign- cryption scheme is proposed. Under the strong Diffie-Hellman assumption, the new scheme is proved secure, in which it satisfies public verifiability and existential unforgeablity. Furthermore, performance analysis shows that the proposed scheme only re- quires two pairing evaluations, so it can be used in the power and bandwidth limited environments. 展开更多
关键词 certificate-based signcryption bilinear parings strong Diffie-Hellman assumption
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部