Cryptanalysis and improvement of an efficient and provably secure identity based signature scheme in the standard model

被引:0
|
作者
Hu, Xiaoming [1 ]
Wang, Jian [1 ]
Yang, Yinchun [1 ]
机构
[1] School of Computer and Information, Shanghai Second Polytechnic University, Shanghai 201209, China
来源
Journal of Information and Computational Science | 2011年 / 8卷 / 15期
关键词
Compendex;
D O I
暂无
中图分类号
学科分类号
摘要
Public key cryptography
引用
收藏
页码:3347 / 3354
相关论文
共 11 条
  • [1] An efficient and provably secure identity-based signature scheme in the standard model
    Li, Ji-Guo
    Jiang, Ping-Jin
    Jisuanji Xuebao/Chinese Journal of Computers, 2009, 32 (11): : 2130 - 2136
  • [2] An identity based universal designated verifier signature scheme secure in the standard model
    Department of Computer Science and Engineering, Shanghai Jiao Tong University, 800 Dongchuan Road, Shanghai, 200240, China
    J Syst Software, 4 (643-649):
  • [3] Provably secure group signature scheme with verifier-local revocation in the standard model
    Li, Ji-Guo
    Sun, Gang
    Zhang, Yi-Chen
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2011, 39 (07): : 1618 - 1623
  • [4] Provably secure certificateless digital signature scheme
    Wang, Hua-Qun
    Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2010, 36 (SUPPL. 2): : 76 - 78
  • [5] Adaptively secure hierarchical identity-based signature in the standard model
    Zhang, Le-You
    Hu, Yu-Pu
    Wu, Qing
    Journal of China Universities of Posts and Telecommunications, 2010, 17 (06): : 95 - 100
  • [6] Yet another efficient and provably-secure certificateless public key signature scheme without pairing
    School of Mathematics and Computer Engineering, Xihua University, Chengdu, China
    不详
    WRI Int. Conf. Commun. Mob. Comput., CMC, 2010, (51-55):
  • [7] Efficient multi-proxy signature scheme with short length in the standard model
    Institute of Image Processing and Pattern Recognition, North China University of Technology, Beijing
    100144, China
    不详
    10083, China
    J. Inf. Sci. Eng., 4 (1097-1112):
  • [8] A fully secure KP-ABE scheme in the standard model
    Zhang, Minqing
    Du, Weidong
    Yang, Xiaoyuan
    Han, Yiliang
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (08): : 1893 - 1901
  • [9] Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme
    Wang, H.
    Zhang, Y.
    Xiong, H.
    Qin, B.
    IET INFORMATION SECURITY, 2012, 6 (01) : 20 - 27
  • [10] Identity-based signature scheme from lattices and its application
    Chen, L. (cl@huel.edu.cn), 1600, ICIC Express Letters Office, Tokai University, Kumamoto Campus, 9-1-1, Toroku, Kumamoto, 862-8652, Japan (07):