ID-based chameleon hash scheme and signature without key escrow

被引:0
|
作者
Zhan, Yang [1 ]
Tian, Hai-Bo [2 ]
Chen, Xiao-Feng [1 ]
Wang, Yu-Min [1 ]
机构
[1] Key Laboratory of the Ministry of Education for Computer Networks and Information Security, Xidian University, Xi'an 710071, China
[2] School of Information Science and Technology, Sun Yat-sen University, Guangzhou 510275, China
来源
Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology | 2010年 / 36卷 / 05期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
10
引用
收藏
页码:685 / 688
相关论文
共 50 条
  • [41] A New ID-Based Proxy Blind Signature Scheme
    LANG Wei-min~1
    2. People’s Liberation Army Institute of Communications Command
    Wuhan University Journal of Natural Sciences, 2005, (03) : 555 - 558
  • [42] Provably secure and ID-based group signature scheme
    Chen, ZW
    Huang, JW
    Huang, DR
    Zhang, JH
    Wang, YM
    18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, : 384 - 388
  • [43] New ID-based proxy blind signature scheme
    Lang, Wei-Min
    Yang, Zong-Kai
    Cheng, Wen-Qing
    Tan, Yun-Meng
    Wuhan University Journal of Natural Sciences, 2005, 10 (03) : 555 - 558
  • [44] A Secure ID-based Verifiably Encrypted Signature Scheme
    Xin Xiangjun
    Zhang Hongwei
    PROCEEDINGS OF THE 14TH YOUTH CONFERENCE ON COMMUNICATION, 2009, : 471 - +
  • [45] An Efficient ID-based Proxy Ring Signature Scheme
    Wu Lei
    Li Daxing
    2009 WRI INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING: CMC 2009, VOL 3, 2009, : 560 - +
  • [46] Analysis of an ID-based Proxy Signature Scheme Without Trusted PKG and a Proxy Blind Multi-signature Scheme
    Sha, Limin
    2014 15TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2014, : 167 - 170
  • [47] One-Round ID-Based Blind Signature Scheme without ROS Assumption
    Gao, Wei
    Wang, Guilin
    Wang, Xueli
    Li, Fei
    PAIRING-BASED CRYPTOGRAPHY - PAIRING 2008, 2008, 5209 : 316 - +
  • [48] Efficient Provable Secure ID-Based Directed Signature Scheme without Random Oracle
    Zhang, Jianhong
    Yang, Yixian
    Niu, Xinxin
    ADVANCES IN NEURAL NETWORKS - ISNN 2009, PT 3, PROCEEDINGS, 2009, 5553 : 318 - +
  • [49] Secure vehicular communications based on group signature and ID-based signature scheme
    Sun, Xiaoting
    Lin, Xiaodong
    Ho, Pin-Han
    2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 1539 - +
  • [50] An ID-based verifiable encrypted signature scheme based on Hess's scheme
    Gu, CX
    Zhu, YF
    INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2005, 3822 : 42 - 52