Biometric identity-based signature scheme

被引:0
|
作者
Hou, Hongxia
Wang, Shangping
Ma, Xiaojing
Dai, Rendong
机构
[1] Research Department of Cipher Code and Network Security, Xi'an University of Science and Technology, Xi'an 710048, China
[2] Department of Information and Control, Xi'an Institute of Post and Telecommunications, Xi'an 710061, China
来源
Jisuanji Gongcheng/Computer Engineering | 2006年 / 32卷 / 15期
关键词
9;
D O I
10.1631/jzus.2006.A0149
中图分类号
学科分类号
摘要
引用
收藏
页码:149 / 151
相关论文
共 50 条
  • [21] Identity-based signature scheme based on quadratic residues
    ZhenChuan Chai
    ZhenFu Cao
    XiaoLei Dong
    Science in China Series F: Information Sciences, 2007, 50 : 373 - 380
  • [22] Identity-based signature scheme based on quintic residues
    Dong, Xue-Dong
    Gao, Yuan
    PROCEEDINGS OF THE 2ND ANNUAL INTERNATIONAL CONFERENCE ON ELECTRONICS, ELECTRICAL ENGINEERING AND INFORMATION SCIENCE (EEEIS 2016), 2016, 117 : 836 - 841
  • [23] Identity-based signature scheme based on quadratic residues
    Chai ZhenChuan
    Cao ZhenFu
    Dong XiaoLei
    SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2007, 50 (03): : 373 - 380
  • [24] Identity-based signature scheme based on quadratic residues
    CHAI ZhenChuan
    Science in China(Series F:Information Sciences), 2007, (03) : 373 - 380
  • [25] A biometric identity based signature scheme with convenient verification
    Liu, Xiaodong
    Miao, Quan
    Li, Daxing
    PROCEEDINGS OF FUTURE GENERATION COMMUNICATION AND NETWORKING, MAIN CONFERENCE PAPERS, VOL 1, 2007, : 113 - 116
  • [26] A New Special Biometric Identity Based Signature Scheme
    Liu, Xiaodong
    Miao, Quan
    Li, Daxing
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2008, 2 (01): : 13 - 18
  • [27] A BIOMETRIC IDENTITY BASED SIGNATURE SCHEME IN THE STANDARD MODEL
    Fan, Liangyun
    Zheng, Jiande
    Yang, Jing
    2009 IEEE INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT, PROCEEDINGS, 2009, : 552 - 556
  • [28] Cryptanalysis of an Identity-Based Convertible Undeniable Signature Scheme
    Behnia, Rouzbeh
    Tan, Syh-Yuan
    Heng, Swee-Huay
    PARADIGMS IN CRYPTOLOGY - MYCRYPT 2016: MALICIOUS AND EXPLORATORY CRYPTOLOGY, 2017, 10311 : 474 - 477
  • [29] An efficient identity-based signature scheme with provable security
    Yi, Peng
    Li, Jiguo
    Liu, Chengdong
    Han, Jinguang
    Wang, Huaqun
    Zhang, Yichen
    Chen, Yu
    INFORMATION SCIENCES, 2021, 576 : 790 - 799
  • [30] An identity-based proxy signature scheme from pairings
    Shim, Kyung-Ah
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2006, 4307 : 60 - 71