咨询与建议

限定检索结果

文献类型

  • 26 篇 期刊文献
  • 7 篇 会议

馆藏范围

  • 33 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 28 篇 工学
    • 18 篇 计算机科学与技术...
    • 12 篇 网络空间安全
    • 8 篇 电气工程
    • 5 篇 信息与通信工程
    • 4 篇 仪器科学与技术
    • 4 篇 电子科学与技术(可...
    • 4 篇 软件工程
    • 3 篇 控制科学与工程
    • 1 篇 机械工程
  • 10 篇 理学
    • 10 篇 数学
  • 1 篇 管理学
    • 1 篇 图书情报与档案管...

主题

  • 33 篇 proxy signature
  • 7 篇 bilinear pairing...
  • 7 篇 digital signatur...
  • 4 篇 blind signature
  • 4 篇 provable securit...
  • 3 篇 standard model
  • 3 篇 cryptography
  • 2 篇 security model
  • 2 篇 multi-proxy sign...
  • 2 篇 nominative proxy...
  • 2 篇 random oracle mo...
  • 2 篇 multi-signature
  • 2 篇 identity-based
  • 2 篇 threshold proxy ...
  • 2 篇 cryptanalysis
  • 2 篇 proxy aggregate ...
  • 2 篇 self-certified p...
  • 1 篇 proxy warrant re...
  • 1 篇 revocation
  • 1 篇 lattice

机构

  • 1 篇 department of in...
  • 1 篇 school of comput...
  • 1 篇 department of co...
  • 1 篇 institute of com...
  • 1 篇 xidian universit...
  • 1 篇 school of scienc...
  • 1 篇 departmentofelec...
  • 1 篇 collegeofinforma...
  • 1 篇 nationa|keylabor...
  • 1 篇 department of co...
  • 1 篇 school of comput...
  • 1 篇 school of electr...
  • 1 篇 applied mathemat...
  • 1 篇 collegeofcompute...
  • 1 篇 shaanxi road tra...
  • 1 篇 department of co...
  • 1 篇 school of inform...
  • 1 篇 department of co...
  • 1 篇 school of manage...
  • 1 篇 school of mathem...

作者

  • 1 篇 li ji-guo. zhang...
  • 1 篇 shirase masaaki
  • 1 篇 lu rong-xing. ca...
  • 1 篇 王永涛
  • 1 篇 machuan-gui gaof...
  • 1 篇 张亦辰
  • 1 篇 龙宇
  • 1 篇 teng yang
  • 1 篇 2. institute of ...
  • 1 篇 zhang yingying
  • 1 篇 liu zhen-hua
  • 1 篇 bin wu
  • 1 篇 yanshuo zhang
  • 1 篇 liji-guo zhangyi...
  • 1 篇 zhang jianhong1 ...
  • 1 篇 chen gengli
  • 1 篇 胡国政
  • 1 篇 tanyun-meng
  • 1 篇 fuxiao-tong xiao...
  • 1 篇 chengwen-qing

语言

  • 27 篇 英文
  • 6 篇 中文
检索条件"主题词=proxy signature"
33 条 记 录,以下是1-10 订阅
排序:
An Efficient proxy Ring signature Without Bilinear Pairing
收藏 引用
Chinese Journal of Electronics 2019年 第3期28卷 514-520页
作者: ZHANG Yingying ZENG Jiwen School of Science Chongqing University of Posts and Telecommunications School of Mathematical Sciences Xiamen University School of Mathematics Science Xinjiang Normal University
proxy ring signature is a proxy signature designed to protect the privacy of the proxy signer. In this paper, we propose a new proxy ring signature based on the Schnorr’s signature. Our scheme combines the idea of th... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A New Revocable and Re-Delegable proxy signature and Its Application
收藏 引用
Journal of Computer Science & Technology 2018年 第2期33卷 380-399页
作者: Shengmin Xu Guomin Yang Yi Mu Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong Wollongong 2500 Australia
With the popularity of cloud computing and mobile Apps, on-demand services such as on-line music or audio streaming and vehicle booking are widely available nowadays. In order to allow efficient delivery and managemen... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A proxy signature Scheme as Secure as Decisional Diffie-Hellman Problem
收藏 引用
Wuhan University Journal of Natural Sciences 2005年 第1期10卷 186-190页
作者: LURong-xing CAOZhen-fu DepartmentofComputerScienceandEngineering ShanghaiJiaotongUniversityShanghai200030China
Based on decisional Difiie-Hcllman problem, we propose a simpleproxy-protected signature scheme In the random oracle model, we also carry out the strict securityproof for the proposed scheme. The security of the propo... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Linear Homomorphic proxy signature Scheme Based on Blockchain for Internet of Things
收藏 引用
Computer Modeling in Engineering & Sciences 2023年 第8期136卷 1857-1878页
作者: Caifen Wang Bin Wu College of Big Data and Internet Shenzhen Technology UniversityShenzhen518118China School of Electronic and Information Engineering Lanzhou Jiaotong UniversityLanzhou730070China
The mushroom growth of IoT has been accompanied by the generation of massive amounts of data.Subject to the limited storage and computing capabilities ofmost IoT devices,a growing number of institutions and organizati... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Cryptanalysis of efficient proxy signature schemes for mobile communication
收藏 引用
Science China(Information Sciences) 2010年 第10期53卷 2016-2021页
作者: SHIRASE Masaaki TAKAGI Tsuyoshi School of Systems Information Science Future University-Hakodate
In a proxy signature scheme, an original signer is allowed to delegate his signing power to a designated person, called the proxy signer and the proxy signer is able to sign the messages on behalf of the original sign... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Secure proxy signature scheme with fast revocation in the standard model
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2009年 第4期16卷 116-124页
作者: LIU Zhen-hua HU Yu-pu ZHANG Xiang-song MA Hua Applied Mathematics Department Xidian University Xi'an 710071 China Key Laboratory of Computer Networks and Information Security Ministry of Education Xidian University Xi'an 710071 China
proxy signature is an important cryptographic primitive and has been suggested in numerous applications, Tne revocation oI delegated rights is an essential issue of the proxy signature schemes. In this article, a secu... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Designing efficient proxy signature schemes for mobile communication
收藏 引用
Science in China(Series F) 2008年 第2期51卷 183-195页
作者: LU RongXing DONG XiaoLei CAO ZhenFu Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200030 China
proxy signature is an active cryptographic research area, and a wide range of literatures can be found nowadays suggesting improvement and generalization of existing protocols in various directions. However, from the ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Efficient ID-Based proxy Blind signature Scheme
收藏 引用
Wuhan University Journal of Natural Sciences 2007年 第1期12卷 105-108页
作者: ZHANG Qing WEN Qiaoyan CHEN Gengli School of Science Beijing University of Posts andTelecommunications Beijing 100876 China School of Computer Wuhan University Wuhan 430072Hubei China
In a proxy blind signature scheme, the proxy signer is allowed to generate a blind signature on behalf of the original signer. The proxy blind signature scheme is useful in several applications such as e-voting and e-... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Formal Model for the Security of proxy signature Schemes
收藏 引用
Wuhan University Journal of Natural Sciences 2005年 第1期10卷 275-278页
作者: GUChun-xiang ZHUYue-fei ZHANGYa-juan NetworkEngineeringDepartment InformationEngineeringUniversityZhengzhou450002HenanChina
This paper provides theoretical foundations for the secure proxy signatureprimitive. We pres-enta formal model for the security of proxy signature schemes, which defines thecapabilities of the adversary and the securi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A New ID-Based proxy Blind signature Scheme
收藏 引用
Wuhan University Journal of Natural Sciences 2005年 第3期10卷 555-558页
作者: LANGWei-min YANGZong-kai CHENGWen-qing TANYun-meng DepartmentofElectronicsandInformationEngineering.HuazhongUniversityofScienceandTechnology Wuhan430074Hubei.China DepartmentofElectronicsandInformationEngineering HuazhongUniversityofScienceandTechnologyWuhan430074HubeiChina//People'sLiberationArmyInstituteofCommunicationsCommandWuhan430010HubeiChina
An identity-based proxy blind signature scheme from bilinear pairings isintroduced, which combines the advantages of proxy signature and blind signature. Furthermore, ourscheme can prevent the original signer from gen... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论