A Proxy-Protected Signature Scheme Based on Finite Automaton

被引:0
|
作者
Cao, Fe [1 ]
Cao, Zhenfu [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, 1954 Huashan Rd, Shanghai 200030, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
10.1109/IMSCCS.2006.165
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper based on finite automaton, we would like to propose a new proxy-protected signature scheme. First we modified the signature scheme of FAPKC4, then used it to construct a new proxy-protected signature scheme. It is the first one constructed from finite automaton, and we analyzed the scheme's security.
引用
收藏
页码:48 / +
页数:2
相关论文
共 50 条
  • [1] An efficient proxy-protected signature scheme based on factoring
    Zhou, Y
    Cao, ZF
    Chai, ZC
    [J]. PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS - ISPA 2005 WORKSHOPS, 2005, 3759 : 332 - 341
  • [2] A proxy-protected proxy signature scheme based on elliptic curve cryptosystem
    Chen, TS
    Liu, TP
    Chung, YF
    [J]. 2002 IEEE REGION 10 CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND POWER ENGINEERING, VOLS I-III, PROCEEDINGS, 2002, : 184 - 187
  • [3] Cryptanalysis and improvement of a proxy-protected signature scheme
    Hu, Xiaoming
    Zhang, Zhe
    Wang, Tong
    [J]. SECOND INTERNATIONAL CONFERENCE ON FUTURE NETWORKS: ICFN 2010, 2010, : 363 - 366
  • [4] Cryptanalysis of a proxy-protected proxy signature scheme based on elliptic curve cryptosystem
    Wang, SH
    Wang, GL
    Bao, F
    Wang, J
    [J]. VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 3240 - 3243
  • [5] A Controlled Proxy-Protected Signature Scheme with Instantaneous Revocation
    Shehata, Khaled
    Selim, Gamal
    Elgindy, Maged
    Kouta, Mohamed Mohamed
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (03): : 27 - 30
  • [6] Provably secure proxy-protected signature schemes based on factoring
    Zhou, Y
    Cao, ZF
    Lu, RX
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 164 (01) : 83 - 98
  • [7] Proxy-protected signature secure against the undelegated proxy signature attack
    Liu, Yu-Chuan
    Wen, Hsiang-An
    Lin, Chun-Li
    Hwang, Tzonelih
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2007, 33 (03) : 177 - 185
  • [8] An Efficient Forward-Secure Proxy-Protected Signature Scheme Based on the Strong RSA Assumption
    Naji, Akram A. M.
    Abu Hasan, Yahya
    [J]. ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2010, : 259 - 264
  • [9] Provably secure proxy-protected signature schemes based on RSA
    Shao, Zuhua
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (03) : 497 - 505
  • [10] Security of Lu et al.'s proxy-protected signature scheme
    Park, JH
    Kang, BG
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (02) : 1010 - 1015