signature=506ccff074d130c2e8d4e3268d3b44f1,Secure proxy signature schemes from the Weil pairing

本文汇总了身份基代理签名领域的研究成果,包括Blaze等人提出的可转移协议和原子代理密码学,Boneh和Franklin的基于 weil 对合的身份加密方案,以及Mambo等人对代理签名的权力委托操作的研究。此外,还讨论了Lee等人提出的强代理签名及其应用,以及使用双线性配对实现的多代理签名和定向签名方案。这些工作在分布式系统授权、安全性和隐私保护方面具有重要意义。
摘要由CSDN通过智能技术生成

1.

Blaze M, Bleumer G, Strauss M (1998) Divertible protocols and atomic proxy cryptography. In: Advances in cryptology (EUROCRYPT’98). Lecture notes in computer science, vol 1403. Springer, Berlin, pp 127–144

2.

Boneh D, Franklin M (2001) Identity based encryption from Weil pairing. In: Advances in cryptography (CRYPTO 2001), Santa Barbara, CA, August 2001

3.

Boldyreva A, Palacio A, Warinschi B Secure proxy signature schemes for delegation of signing rights. Preprint, available at http://eprint.iacr.org/2003/096/

4.

Bellare M, Rogaway P (1993) Random oracles are practical: a paradigm for designing efficient protocols. In: First ACM conference on computer and communications security. Lecture notes in computer science. Springer, Berlin

5.

Herranz J, Saez G Revisiting fully distributed proxy signature schemes. Preprint, available at http://eprint.iacr.org/2003/197/

6.

Kim S, Park S, Won D (1997) Proxy signatures, revisited. In: ICICS’97. Lecture notes in computer science, vol 1334. Springer, Berlin, pp 223–232

7.

Lee B, Kim H, Kim K (2001) Strong proxy signature and its applications. In: Proceedings of SCIS

8.

Li X, Chen K (2005) ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings. Appl Math Comput 169(1):437–450

9.

Liu J, Huang S (2010) Identity-based threshold proxy signature from bilinear pairing. Informatica 21(1):41–56

10.

Mambo M, Usuda K, Okamoto E (1996) Proxy signatures: delegation of the power to sign message. IEICE Trans Fundam Electron Commun Comput Sci 79-A(9):1338–1353

11.

Mambo M, Usuda K, Okamoto E (1996) Proxy signatures for delegation signing operation. In: Proc third ACM conf on computer and communications security, pp 48–57

12.

Neuman BC (1993) Proxy-based authorization and accounting for distributed systems. In: Proc 13th international conference on distributed systems, pp 283–291

13.

Umaparasada Rao B, Vasudeva Reddy P (2011) ID-based directed multi-proxy signature scheme from bilinear pairings. Int J Comput Sci Netw Secur 5(1):107–117

14.

Sun X, Li J, Chen G, Yung S (2008) Identity-based directed signature scheme from bilinear pairings. Cryptology e-print archive, report 2008/305. http://eprint.iacr.org

15.

Varadharajan V, Allen P, Black S (1991) An analysis of the proxy problem in distributed systems. In: Proc 1991 IEEE computer society symposium on research in security and privacy, pp 255–275

16.

Wu W, Mu Y, Seberry W, Huang X (2007) Identity-based proxy signature from pairings. In: The 4th international conference on autonomic and trusted computing, pp 22–31

17.

Xu J, Zhang Z, Feng D (2005) Id-based proxy signature using bilinear pairings. In: Parrallel and distributed processing and applications, pp 359–367

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值