Journal of Shanghai Jiaotong University ›› 2013, Vol. 47 ›› Issue (08): 1239-1245.
• Automation Technique, Computer Technology • Previous Articles Next Articles
Received:2012-09-17
Online:2013-08-29
Published:2013-08-29
CLC Number:
CHEN Jianhong1,2,SHAN Jingsong1,YANG Ronggen1,GONG Lejun1,CHEN Kefei 2,YU Kun1,CHEN Liqing1,SUN Chengfu1. Identity-based Threshold Key-insulated Signature Without Random Oracles
| [1]Dodis Y, Katz J, Xu S, et al. Keyinsulated publickey cryptosystem [C]//Proceedings of EUROCRYPT’02: LNCS 2332. Berlin: SpringerVerlag, 2002: 6582. [2]Hanaoka Y, Hanaoka G, Shikata J, et al. Identitybased hierarchical strongly keyinsulated encryption and its application [C]//Proceedings of ASIACRYPT’05: LNCS 3788. Berlin: SpringerVerlag, 2006: 105122. [3]Weng J, Chen K, Liu S, et al. Identitybased strong keyinsulated signature without random oracles [J]. Journal of Software, 2008, 19(6): 15551564. [4]Weng J, Chen K, Li X, et al. Identitybased threshold keyinsulated encryption without random oracles[C]//Proceedings of CTRSA’08: LNCS 4964. Berlin: SpringerVerlag, 2008: 203220. [5]Chen J, Chen K, Long Y. Identitybased threshold keyinsulated signature [J]. High Technology Letters, 2012, 18(3): 275280. [6]Canetti R, Goldreich O, Halevi S. The random oracle methodology, revisited [J]. Journal of the ACM, 2004, 51(4): 557594. |
| [1] | MIRZAEE Siavash, JIANG Letian *(蒋乐天). Fast Confidentiality-Preserving Authentication for Vehicular Ad Hoc Networks [J]. Journal of Shanghai Jiao Tong University (Science), 2019, 24(1): 31-40. |
| [2] | GAO Wen* (高雯), HU Yupu (胡予濮), ZHANG Yanhua (张彦华), WANG Baocang (王保仓). Lattice-Based Group Signature with Verifier-Local Revocation [J]. Journal of shanghai Jiaotong University (Science), 2017, 22(3): 313-321. |
| [3] | LONG Yu1* (龙宇), CHEN Ke-fei2 (陈克非), MAO Xian-ping1 (毛贤平). New Constructions of Dynamic Threshold Cryptosystem [J]. Journal of shanghai Jiaotong University (Science), 2014, 19(4): 431-435. |
| [4] | MAO Xian-ping1 (毛贤平), CHEN Ke-fei2*(陈克非), LONG Yu1 (龙宇), WANG Liang-liang1 (王亮亮). Attribute-Based Signature on Lattices [J]. Journal of shanghai Jiaotong University (Science), 2014, 19(4): 406-411. |
| [5] | SUN Jin1,2,HU Yupu2. Fully Secure Anonymous Identity-Based Broadcast Encryption Scheme [J]. Journal of Shanghai Jiaotong University, 2013, 47(07): 1103-1108. |
| [6] | LU Hai-Jun, YU Xiu-Yuan, XIE Qi. Provably Secure Certificateless Aggregate Signature with Constant Length [J]. Journal of Shanghai Jiaotong University, 2012, 46(02): 259-263. |
| [7] | MING Yang (明 洋), WANG Yu-min (王育民). Directed Proxy Signature in the Standard Model [J]. Journal of shanghai Jiaotong University (Science), 2011, 16(6): 663-671. |
| [8] | CHEN Jian-hong (陈剑洪), LONG Yu (龙 宇), CHEN Ke-fei (陈克非) WANG Yong-tao (王永涛),LI Xiang-xue (李祥学). An Efficient Threshold Key-Insulated Signature Scheme [J]. Journal of shanghai Jiaotong University (Science), 2011, 16(6): 658-662. |
| [9] | TSO Ray-lin (左瑞麟), KIM Cheonshik, YI Xun (易 训). Certificateless Message Recovery Signatures Providing Girault's Level-3 Security [J]. Journal of shanghai Jiaotong University (Science), 2011, 16(5): 577-585. |
| [10] | CHEN Jian-hong (陈剑洪), LONG Yu (龙 宇), CHEN Ke-fei (陈克非), WANG Yong-tao (王永涛). Identity-Based Key-Insulated Proxy Signature Without Random Oracles [J]. Journal of shanghai Jiaotong University (Science), 2011, 16(5): 557-566. |
| [11] | SHEN Zhong-hua (沈忠华), YU Xiu-yuan (于秀源) . Threshold Signature Scheme with Threshold Verification Based on Multivariate Linear Polynomial [J]. Journal of shanghai Jiaotong University (Science), 2011, 16(5): 551-556. |
| [12] | HE Guo-feng 1(何国锋), LI Xiang-xue 2(李祥学), LI Qiang 3(李 强), ZHENG Dong 3(郑 东). Efficient Democratic Group Signatures with Threshold Traceability [J]. Journal of shanghai Jiaotong University (Science), 2011, 16(5): 530-532. |
| [13] |
ZHANG Hai1,DONG Xiaolei1,CAO Zhenfu1,CAO Feng2.
(t, k, l)-Threshold Proxy Signature Without Random Oracle [J]. Journal of Shanghai Jiaotong University, 2010, 44(08): 1031-1036. |
| [14] | MA Rong,CAO Zhenfu. An Efficient and Full Secure IdentityBased Encryption Scheme [J]. Journal of Shanghai Jiaotong University, 2010, 44(03): 389-0392. |
| Viewed | ||||||
|
Full text |
|
|||||
|
Abstract |
|
|||||