The proxy signature scheme based on the NTRUSign signature

被引:0
|
作者
Zhuo, Zepeng [1 ]
Wei, Shimin [1 ]
机构
[1] Huaibei Coal Normal Coll, Dept Comp Sci & Tech, Huaibei 235000, Anhui, Peoples R China
来源
ADVANCING SCIENCE THROUGH COMPUTATION | 2008年
关键词
signature; NTRUSign; delegation; proxy signature;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
NTRUSign is a signature scheme based on NTRU. The security of the scheme is based on the CVP problem in lattices. We construct the new proxy signature based on the NTRUSign signature, and analyze the essential security characters..
引用
收藏
页码:302 / 305
页数:4
相关论文
共 50 条
  • [1] Fault analysis of the NTRUSign digital signature scheme
    Kamal, Abdel Alim
    Youssef, Amr M.
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2012, 4 (02): : 131 - 144
  • [2] Fault analysis of the NTRUSign digital signature scheme
    Abdel Alim Kamal
    Amr M. Youssef
    Cryptography and Communications, 2012, 4 : 131 - 144
  • [3] Proxy multi-signature scheme: A new type of proxy signature scheme
    Yi, LJ
    Bai, GQ
    Xiao, GZ
    ELECTRONICS LETTERS, 2000, 36 (06) : 527 - 528
  • [4] Proxy group signature: A new anonymous proxy signature scheme
    Wu, Ke-Li
    Zou, Jing
    Wei, Xiang-He
    Liu, Feng-Yu
    PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 1369 - +
  • [5] Cryptoanalyzing and Improving for Directed Signature Scheme and The Proxy Signature Scheme
    Hu, Xiaoming
    Jiang, Wenrong
    Ma, Chuang
    Yu, Chengcheng
    2018 11TH INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, BIOMEDICAL ENGINEERING AND INFORMATICS (CISP-BMEI 2018), 2018,
  • [6] A Proxy Signature Scheme Based on Coding Theory
    Jannati, Hoda
    Falahati, Abolfazl
    GLOBAL SECURITY, SAFETY, AND SUSTAINABILITY, 2010, 92 : 282 - 290
  • [7] ECC BASED SELF PROXY SIGNATURE SCHEME
    Kar, Binayak
    Khan, Asif Uddin
    Tripathy, Laxminath
    Sahoo, Priyabrata
    Parida, Raj Kumar
    2011 INTERNATIONAL CONFERENCE ON INSTRUMENTATION, MEASUREMENT, CIRCUITS AND SYSTEMS (ICIMCS 2011), VOL 3: COMPUTER-AIDED DESIGN, MANUFACTURING AND MANAGEMENT, 2011, : 409 - 412
  • [8] Proxy Signature Scheme Based on Bionic Evolution
    Zhou, Xuanwu
    2009 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL 3, PROCEEDINGS, 2009, : 678 - 681
  • [9] A proxy blind signature scheme based on ECDLP
    Wang, H
    Wang, R
    CHINESE JOURNAL OF ELECTRONICS, 2005, 14 (02): : 281 - 284
  • [10] A Proxy Blind Signature Scheme Based on DLP
    YU Baozheng
    WuhanUniversityJournalofNaturalSciences, 2007, (01) : 83 - 86