[PDF][PDF] 无证书公钥密码体制研究
张福泰, 孙银霞, 张磊, 耿曼曼, 李素娟 - 软件学报, 2011 - jos.org.cn
无证书公钥密码体制研究 Page 1 软件学报ISSN 1000-9825, CODEN RUXUEW E-mail: jos@iscas.ac.cn
Journal of Software,2011,22(6):1316−1332 [doi: 10.3724/SP.J.1001.2011.04007] http://www.jos.org.cn …
Journal of Software,2011,22(6):1316−1332 [doi: 10.3724/SP.J.1001.2011.04007] http://www.jos.org.cn …
[HTML][HTML] An efficient certificateless proxy signature scheme without pairing
The proxy signature scheme allows a proxy signer to sign messages on behalf of an original
signer, a company or an organization. Such schemes have lots of practical applications …
signer, a company or an organization. Such schemes have lots of practical applications …
[HTML][HTML] Provably secure certificateless proxy signature scheme in the standard model
Y Lu, J Li - Theoretical Computer Science, 2016 - Elsevier
Certificateless public key cryptography was introduced to solve the key escrow problem in
identity-based cryptography and eliminate the use of certificates. As an extension of proxy …
identity-based cryptography and eliminate the use of certificates. As an extension of proxy …
[PDF][PDF] 可证安全的无证书代理签名方案
陈虎, 张福泰, 宋如顺 - 软件学报, 2009 - jos.org.cn
研究在新提出的无证书公钥密码系统下的代理签名问题, 给出了无证书代理签名方案非常强的
安全模型. 该安全模型下的攻击者是能力最强的超级类型I 和类型II 攻击者. 同时 …
安全模型. 该安全模型下的攻击者是能力最强的超级类型I 和类型II 攻击者. 同时 …
Delegation of signing rights using certificateless proxy signatures
L Zhang, F Zhang, Q Wu - Information Sciences, 2012 - Elsevier
A proxy signature scheme allows a proxy signer to sign messages on behalf of an original
signer within a given context. It has lots of practical applications in distributed systems, grid …
signer within a given context. It has lots of practical applications in distributed systems, grid …
ECDLP‐based certificateless proxy signature scheme with message recovery
Certificateless public key cryptography (PKC) eliminates the use of certificates in traditional
PKC and the key escrow problem in identity‐based PKC. Up to now, a number of …
PKC and the key escrow problem in identity‐based PKC. Up to now, a number of …
Certificateless proxy signature scheme with provable security
陈虎, 张福泰, 宋如顺 - Journal of Software, 2009 - jos.org.cn
研究在新提出的无证书公钥密码系统下的代理签名问题, 给出了无证书代理签名方案非常强的
安全模型. 该安全模型下的攻击者是能力最强的超级类型 I 和类型 II 攻击者. 同时 …
安全模型. 该安全模型下的攻击者是能力最强的超级类型 I 和类型 II 攻击者. 同时 …
A provably secure proxy signature scheme in certificateless cryptography
A proxy signature scheme enables an original signer to delegate its signing capability to a
proxy signer and then the proxy signer can sign a message on behalf of the original signer …
proxy signer and then the proxy signer can sign a message on behalf of the original signer …
A certificateless proxy re-signature scheme
G Duntao, W Ping, Y Dan… - 2010 3rd International …, 2010 - ieeexplore.ieee.org
Proxy re-signature is greatly concerned by researchers recently. It is a very useful tool for
sharing web certificates, forming weak group signatures, and authenticating a network path …
sharing web certificates, forming weak group signatures, and authenticating a network path …
Certificateless proxy signature scheme in the standard model
Y Ming, Y Wang - Fundamenta Informaticae, 2018 - content.iospress.com
Proxy signature is extension of the standard signature, in which the original signer can
delegate his or her signing capability to proxy signer in such a way that the latter can sign …
delegate his or her signing capability to proxy signer in such a way that the latter can sign …