Identity-based proxy signature enables an entity to delegate its signing rights to another entity in identity-based cryptosystem settings. However, few existing scheme has been proved secure in a formalized model, or ...Identity-based proxy signature enables an entity to delegate its signing rights to another entity in identity-based cryptosystem settings. However, few existing scheme has been proved secure in a formalized model, or acquired optimized performance. To achieve the goals of both proven security and high efficiency, this paper proposed an efficient identity-based proxy signature scheme. The scheme is constructed from bilinear pairing and proved secure in the random oracle model, using the oracle replay attack technique introduced by Pointehval and Stern. The analysis shows that the scheme needs less computation costs and has a shorter signature than the other schemes.展开更多
We consider a symbolic coding of bi-infinite non periodic geodesics on the L-shaped translation surface tiled by three squares. Each bi-infinite non periodic geodesic is associated with a cutting sequence correspondin...We consider a symbolic coding of bi-infinite non periodic geodesics on the L-shaped translation surface tiled by three squares. Each bi-infinite non periodic geodesic is associated with a cutting sequence corresponding to the sequence of labeled saddle connections hit. We prove that there is a relationship between the cutting sequences and the actions of some affine automorphisms of the translation surface. We also get an explicit formula to determine the direction of a bi-infinite non periodic geodesic by using the corresponding cutting sequence.展开更多
基金National Natural Science Foundation of Chi-na for Distinguished Young Scholars (No.60225007)National Research Fund for theDoctoral Program of Higher Education ofChina (No.20020248024)Grant-in-Aid forScientific Research(C) (No.14540100)
文摘Identity-based proxy signature enables an entity to delegate its signing rights to another entity in identity-based cryptosystem settings. However, few existing scheme has been proved secure in a formalized model, or acquired optimized performance. To achieve the goals of both proven security and high efficiency, this paper proposed an efficient identity-based proxy signature scheme. The scheme is constructed from bilinear pairing and proved secure in the random oracle model, using the oracle replay attack technique introduced by Pointehval and Stern. The analysis shows that the scheme needs less computation costs and has a shorter signature than the other schemes.
基金supported by National Natural Science Foundation of China(Grant No.11371035)
文摘We consider a symbolic coding of bi-infinite non periodic geodesics on the L-shaped translation surface tiled by three squares. Each bi-infinite non periodic geodesic is associated with a cutting sequence corresponding to the sequence of labeled saddle connections hit. We prove that there is a relationship between the cutting sequences and the actions of some affine automorphisms of the translation surface. We also get an explicit formula to determine the direction of a bi-infinite non periodic geodesic by using the corresponding cutting sequence.