An efficient randomized signature from pairings

被引:0
|
作者
Xin, Xiangjun [1 ]
Li, Le [1 ]
Dong, Qingkuan [2 ]
机构
[1] Depart. of Math. And Infor. Sci., Zhengzhou Univ. of Light Ind., Zhengzhou 450002, China
[2] State Key Lab. of Integrated Service Networks, Xidian University, Xi'an 710071, China
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:1367 / 1372
相关论文
共 50 条
  • [31] Anonymizable Signature and Its Construction from Pairings
    Hoshino, Fumitaka
    Kobayashi, Tetsutaro
    Suzuki, Koutarou
    PAIRING-BASED CRYPTOGRAPHY-PAIRING 2010, 2010, 6487 : 62 - 77
  • [32] Towards Efficient ID-based Signature Schemes with Batch Verifications from Bilinear Pairings
    Tseng, Yuh-Min
    Wu, Tsu-Yang
    Wu, Jui-Di
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 935 - 940
  • [33] A new blind signature and threshold blind signature scheme from pairings
    Cui, Wei
    Xin, Yang
    Yang, Yixian
    Niu, Xinxin
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 699 - 702
  • [34] ID-based, blind signature and ring signature from pairings
    Zhang, FG
    Kim, K
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS, 2002, 2501 : 533 - 547
  • [35] Efficient identity-based threshold signature scheme from bilinear pairings in standard model
    Li, Fei
    Gao, Wei
    Wang, Guilin
    Chen, Kefei
    Wang, Xueli
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2014, 8 (2-3) : 107 - 115
  • [36] Efficient and provably secure trapdoor-free group signature schemes from bilinear pairings
    Nguyen, L
    Safavi-Naini, R
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2004, PROCEEDINGS, 2004, 3329 : 372 - 386
  • [37] A New Efficient Certificateless Short Signature Scheme Using Bilinear Pairings
    Tsai, Jia-Lun
    IEEE SYSTEMS JOURNAL, 2017, 11 (04): : 2395 - 2402
  • [38] Efficient Proxy Signature Scheme for Mobile Devices Using Bilinear Pairings
    Tsai, Jia-Lun
    Lo, Nai-Wei
    Wu, Tzong-Chen
    INFORMATION TECHNOLOGY AND CONTROL, 2013, 42 (04): : 309 - 314
  • [39] Identity-based proxy signature from pairings
    Wu, Wei
    Mu, Yi
    Susilo, Willy
    Seberry, Jennifer
    Huang, Xinyi
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 22 - +
  • [40] A provable encrypted ring signature from bilinear pairings
    Miao, FY
    Xiong, Y
    Yang, SB
    Wang, XF
    CHINESE JOURNAL OF ELECTRONICS, 2006, 15 (02): : 204 - 208