Security analysis of a threshold proxy signature scheme using self-certified public keys

被引:0
|
作者
Lu, Rong-Bo [1 ,2 ]
He, Da-Ke [2 ]
Wang, Chang-Ji [3 ]
机构
[1] College of Mathematics and Computer Sci., Jishou Univ., Jishou 416000, China
[2] Lab. of Info. Security and National Computing Gird, Southwest Jiaotong Univ., Chengdu 610031, China
[3] Dept. of Computer Sci., Sun Yat-Sen Univ., Guangzhou 510275, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
12
引用
收藏
页码:91 / 95
相关论文
共 50 条
  • [31] Self-certified signature scheme from pairings
    Shao, Zuhua
    JOURNAL OF SYSTEMS AND SOFTWARE, 2007, 80 (03) : 388 - 395
  • [32] Self-Certified Proxy Convertible Authenticated Encryption Scheme
    Lin, Han-Yu
    Wu, Tzong-Sun
    Huan, Ting-Yu
    Yeh, Yi-Shiung
    ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 3, PROCEEDINGS, 2008, : 479 - +
  • [33] Digital signature with message recovery using self-certified public keys without trustworthy system authority
    Chang, YF
    Chang, CC
    Huang, HF
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 161 (01) : 211 - 227
  • [34] Cryptoanlaysis of a Self-certified Partially Blind Signature and a Proxy Blind Signature
    Zhang, Jianhong
    Gao, Shengnan
    2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL II, 2009, : 184 - 187
  • [35] Repairing ElGamal-like multi-signature schemes using self-certified public keys
    Hwang, SH
    Lee, YH
    APPLIED MATHEMATICS AND COMPUTATION, 2004, 156 (01) : 73 - 83
  • [36] An Efficient Anonymous Batch Authenticated and Key Agreement Scheme Using Self-Certified Public Keys in VANETs
    Wang, Xinyi
    Huang, Zheng
    Wen, Qiaoyan
    Zhang, Hua
    2013 IEEE INTERNATIONAL CONFERENCE OF IEEE REGION 10 (TENCON), 2013,
  • [37] The security analysis of a threshold proxy quantum signature scheme
    Shi JianHong
    Zhang ShengLi
    Chang ZhengGang
    SCIENCE CHINA-PHYSICS MECHANICS & ASTRONOMY, 2013, 56 (03) : 519 - 523
  • [38] The security analysis of a threshold proxy quantum signature scheme
    SHI JianHong
    ZHANG ShengLi
    CHANG ZhengGang
    Science China(Physics,Mechanics & Astronomy), 2013, Mechanics & Astronomy)2013 (03) : 519 - 523
  • [39] The security analysis of a threshold proxy quantum signature scheme
    JianHong Shi
    ShengLi Zhang
    ZhengGang Chang
    Science China Physics, Mechanics and Astronomy, 2013, 56 : 519 - 523
  • [40] Efficient Self-Certified Blind Signature Scheme with Parings
    Zhang, Jian-hong
    Zhen, Wei-na
    2014 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION AND SENSOR NETWORK (WCSN), 2014, : 198 - 203