ID-based chameleon hash scheme and signature without key escrow

被引:0
|
作者
Zhan, Yang [1 ]
Tian, Hai-Bo [2 ]
Chen, Xiao-Feng [1 ]
Wang, Yu-Min [1 ]
机构
[1] Key Laboratory of the Ministry of Education for Computer Networks and Information Security, Xidian University, Xi'an 710071, China
[2] School of Information Science and Technology, Sun Yat-sen University, Guangzhou 510275, China
来源
Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology | 2010年 / 36卷 / 05期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
10
引用
收藏
页码:685 / 688
相关论文
共 50 条
  • [1] Improved ID-based signature scheme solving key escrow
    Dept. of Electronic Eng., Shanghai Jiaotong Univ., Shanghai 200030, China
    J. Shanghai Jiaotong Univ. Sci., 2006, 2 (121-126):
  • [2] Improved ID-Based Signature Scheme Solving Key Escrow
    廖剑
    戚英豪
    黄佩伟
    戎蒙括
    李生红
    JournalofShanghaiJiaotongUniversity(Science), 2006, (02) : 121 - 126
  • [3] An ID-Based Server-Aided Verification Short Signature Scheme Avoid Key Escrow
    Zhang, Jianhong
    Sun, Zhibin
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2013, 29 (03) : 459 - 473
  • [4] ID-based chameleon signature scheme from bilinear pairing
    Du, X.-J. (dxjwy2002@hotmail.com), 2005, South China University of Technology (33):
  • [5] A Modified ID-Based Proxy Signature Scheme without Key Generation Center
    Liu Er-gen
    Zhou Hua-jing
    Zuo Li-ming
    Wang Xia
    Zhou Hua-jing
    ELECTRICAL AND CONTROL ENGINEERING & MATERIALS SCIENCE AND MANUFACTURING, 2016, : 276 - 281
  • [7] Chameleon hash without key exposure based on Schnorr signature
    Gao, Wei
    Li, Fei
    Wang, Xueli
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (02) : 282 - 285
  • [8] A Secure ID-Based Explicit Authenticated Key Agreement Protocol without Key Escrow
    Hou, Mengbo
    Xu, Qiuliang
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 487 - 490
  • [9] ID-based signature scheme without trusted PKG
    Liao, J
    Xiao, JF
    Qi, YH
    Huang, PW
    Rong, MT
    INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2005, 3822 : 53 - 62
  • [10] Efficient ID-based Key-insulated Multi Signature Scheme without Pairings
    Babu, A. Ramesh
    Gayathri, N. B.
    Reddy, P. Vasudeva
    2019 INNOVATIONS IN POWER AND ADVANCED COMPUTING TECHNOLOGIES (I-PACT), 2019,