An efficient and provably secure identity-based signature scheme in the standard model

被引:1
|
作者
Li, Ji-Guo [1 ]
Jiang, Ping-Jin [1 ]
机构
[1] College of Computer and Information Engineering, Hohai University, Nanjing 210098, China
来源
关键词
Compendex;
D O I
10.3724/SP.J.1016.2009.02130
中图分类号
学科分类号
摘要
Hash functions
引用
收藏
页码:2130 / 2136
相关论文
共 50 条
  • [1] Cryptanalysis and improvement of an efficient and provably secure identity based signature scheme in the standard model
    Hu, Xiaoming
    Wang, Jian
    Yang, Yinchun
    [J]. Journal of Information and Computational Science, 2011, 8 (15): : 3347 - 3354
  • [2] Secure Identity-Based Blind Signature Scheme in the Standard Model
    Hu, Xiao-Ming
    Huang, Shang-Teng
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2010, 26 (01) : 215 - 230
  • [3] IBUOV, a Provably Secure Identity-Based UOV Signature Scheme
    Shen, Wuqiang
    Tang, Shaohua
    Xu, Lingling
    [J]. 2013 IEEE 16TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE 2013), 2013, : 388 - 395
  • [4] Efficient pairing-free provably secure identity-based proxy blind signature scheme
    Tan, Zuowen
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (05) : 593 - 601
  • [5] Efficient Pairing-Free Provably Secure Scalable Revocable Identity-Based Signature Scheme
    Wang, Chang-Ji
    Huang, Hui
    Yuan, Yuan
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (02): : 503 - 509
  • [6] A secure and efficient identity-based quantum signature scheme
    Liu, Bai
    Zhu, Pengda
    Guo, Kuikui
    [J]. AIP ADVANCES, 2024, 14 (06)
  • [7] Cryptanalysis of a secure and efficient identity-based signature scheme
    Yu, Yong
    Ni, Jian-Bing
    Xu, Chun-Xiang
    Niu, Lei
    [J]. Ruan Jian Xue Bao/Journal of Software, 2014, 25 (05): : 1125 - 1131
  • [8] A New Provably Secure Identity-Based Multi-proxy Signature Scheme
    Chen, Qunshan
    Huang, Zhenjie
    Ding, Yong
    Zhou, Yuping
    Huang, Hui
    [J]. CYBERSPACE SAFETY AND SECURITY, PT I, 2020, 11982 : 230 - 242
  • [9] An efficient and provable secure identity-based identification scheme in the standard model
    Chin, Ji-Jian
    Heng, Swee-Huay
    Coi, Bok-Min
    [J]. PUBLIC KEY INFRASTRUCTURE, 2008, 5057 : 60 - +
  • [10] Identity-based threshold signature secure in the standard model
    Xiong, Hu
    Qin, Zhiguang
    Li, Fagen
    [J]. International Journal of Network Security, 2010, 10 (01) : 75 - 80