ID-based chameleon hash scheme and signature without key escrow

被引:0
|
作者
Zhan, Yang [1 ]
Tian, Hai-Bo [2 ]
Chen, Xiao-Feng [1 ]
Wang, Yu-Min [1 ]
机构
[1] Key Laboratory of the Ministry of Education for Computer Networks and Information Security, Xidian University, Xi'an 710071, China
[2] School of Information Science and Technology, Sun Yat-sen University, Guangzhou 510275, China
来源
Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology | 2010年 / 36卷 / 05期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
10
引用
收藏
页码:685 / 688
相关论文
共 50 条
  • [31] Efficient ID-based proxy chameleon signature from bilinear pairings
    Zhang, Miaomiao
    Chen, Gongliang
    Li, Jianhua
    FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 135 - +
  • [32] Security of ID-based key exchange scheme
    Scott, M
    ELECTRONICS LETTERS, 1998, 34 (07) : 653 - 654
  • [33] A SIMPLE ID-BASED SCHEME FOR KEY SHARING
    TSUJII, S
    CHAO, JH
    ARAKI, K
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1993, 11 (05) : 730 - 734
  • [34] ID-based proxy signature scheme with message recovery
    Singh, Harendra
    Verma, Girraj Kumar
    JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (01) : 209 - 214
  • [35] A novel ID-based designated verifier signature scheme
    Zhang, Jianhong
    Mao, Jane
    INFORMATION SCIENCES, 2008, 178 (03) : 766 - 773
  • [36] Key-escrow Resistant ID-based Authentication Scheme for IEEE 802.11s Mesh Networks
    Boudguiga, Aymen
    Laurent, Maryline
    2011 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2011, : 784 - 789
  • [37] Efficient ID-Based Proxy Blind Signature Scheme
    ZHANG Qing1
    2. School of Computer
    Wuhan University Journal of Natural Sciences, 2007, (01) : 105 - 108
  • [38] Efficient ID-based Threshold Ring Signature scheme
    Jiang Han
    Xu QiuLiang
    Chen Guohua
    EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 437 - 442
  • [39] A New ID-Based Threshold Group Signature Scheme
    Zhang, Zhiqiang
    Ye, Yunlong
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
  • [40] An efficient ID-based partially blind signature scheme
    Hu, Xiaoming
    Huang, Shangteng
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 291 - +