ID-based chameleon hash scheme and signature without key escrow

被引:0
|
作者
Zhan, Yang [1 ]
Tian, Hai-Bo [2 ]
Chen, Xiao-Feng [1 ]
Wang, Yu-Min [1 ]
机构
[1] Key Laboratory of the Ministry of Education for Computer Networks and Information Security, Xidian University, Xi'an 710071, China
[2] School of Information Science and Technology, Sun Yat-sen University, Guangzhou 510275, China
来源
Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology | 2010年 / 36卷 / 05期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
10
引用
收藏
页码:685 / 688
相关论文
共 50 条
  • [21] ID-based proxy blind signature scheme
    School of Mathematics and Computer Science, Nanjing Normal University, Nanjing 210097, China
    不详
    Jisuanji Gongcheng, 2006, 17 (203-204+224):
  • [22] An ID-based proxy signature scheme secure against proxy key exposure
    Wen F.
    Cui S.
    Cui J.
    International Journal of Advancements in Computing Technology, 2011, 3 (05) : 108 - 116
  • [23] Pairing-free ID-based key-insulated signature scheme
    School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu
    610054, China
    J. Electron. Sci. Technol., 1 (33-38):
  • [24] ID-based, Proxy, Threshold Signature Scheme
    Pomykala, Jacek
    Kulakowski, Henryk
    Sapiecha, Piotr
    Grela, Blazej
    INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2021, 67 (02) : 201 - 205
  • [25] An ID-based multi-signature scheme
    Meng, Tao
    Zhang, Xinping
    Sun, Shenghe
    2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL II, PROCEEDINGS, 2007, : 115 - 117
  • [26] Pairing-Free ID-Based Key-Insulated Signature Scheme
    Guo-Bin Zhu
    Hu Xiong
    Zhi-Guang Qin
    Journal of Electronic Science and Technology, 2015, 13 (01) : 33 - 38
  • [27] A new digital signature scheme on ID-based key-sharing infrastructures
    Nishioka, T
    Hanaoka, G
    Imai, H
    INFORMATION SECURITY, PROCEEDINGS, 1999, 1729 : 259 - 270
  • [28] Cryptanalysis of a digital signature scheme on ID-based key-sharing infrastructures
    Wu, HJ
    Bao, F
    Deng, RH
    PUBLIC KEY CRYPTOGRAPHY, PROCEEDINGS, 2001, 1992 : 173 - 179
  • [29] Scheme for (T, N) threshold ID-based signature without a trusted dealer
    Cai, Yong-Quan
    Zhang, Ke
    2007 INTERNATIONAL CONFERENCE ON WAVELET ANALYSIS AND PATTERN RECOGNITION, VOLS 1-4, PROCEEDINGS, 2007, : 1341 - 1345
  • [30] ATTACKS ON AN ID-BASED SIGNATURE SCHEME BASED ON RABIN PUBLIC-KEY CRYPTOSYSTEM
    KO, MY
    HWANG, T
    CHANG, CC
    COMPUTER COMMUNICATIONS, 1994, 17 (09) : 674 - 676