JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2019, Vol. 54 ›› Issue (1): 79-87.doi: 10.6040/j.issn.1671-9352.2.2018.056
ZUO Li-ming1,2,3, CHEN Lan-lan1,3, ZHOU Qing1,3
CLC Number:
[1] GENTRY C. Certificate-based encryption and the certificate revocation problem[C] // International Conference on Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2003: 272-293. [2] KANG B, PARK J, HAHN S. A certificate-based signature scheme[C] // Cryptolograheres Track Research Conference Held at the RSA Conference. New York: Springer, 2004: 99-111. [3] LIU J K, BAEK J, SUSILO W, et al. Certificate-based signature schemes without pairings or random oracles[C] // Proceedings of the ISC 2008. Berlin: Springer, 2008: 285-297. [4] ZHANG J H. On the security of a certificate-based signature scheme and its improvement with pairings[C] // Proceedings of the ISPEC 2009. Berlin: Springer, 2009: 47-58. [5] 周萍, 何大可. 高效不含双线性对的基于证书签名方案[J]. 计算机应用研究, 2013, 30(5):1504-1507, 1519. ZHOU Ping, HE Dake. Efficient certificate-based signature scheme without pairings[J]. Application Research of Computers, 2013, 30(5):1504-1507, 1519. [6] HUANG R, NONG Q. An efficient certificate-based verifiable encrypted signature scheme sithout pairings[J]. Journal of Computer Applications, 2014, 13(3/4): 257-267. [7] ZHANG Y C, LI J G, WANG Z W, et al. A new efficient certificate-based signature scheme[J]. Chinese Journal of Electronics, 2015, 24(04):776-782. [8] YANG L, LI J. Improved certificate-based signature scheme without random oracles[J]. IET Information Security, 2016, 10(2):80-86. [9] ZHOU C, CUI Z. Certificate-based signature scheme in the standard model[J]. IET Information Security, 2017, 11(5):256-260. [10] BONEH D, LYNN B, SHACHAM H. Short signatures from the Weil pairing[C] // Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology. Berlin: Springer, 2001: 514-532. [11] LI J G, HUANG X Y, ZHANG Y C, et al. An efficient short certificate-based signature scheme[J]. Journal of Systems & Software, 2012, 85(2):314-322. [12] WU W, MU Y, SUSILO W. Certificate-based signatures: new definitions and a generic construction from certificateless signatures[C] // Lecture Notes in Computer Science, Vol5379, Berlin: Springer, 2009: 99-114. [13] 李志敏, 徐馨, 李存华. 高效的基于证书数字签名设计方案[J]. 计算机应用研究, 2012, 29(4):1430-1433, 1444. LI Zhimin, XU Xin, LI Cunhua. Design of efficient certificate-based signature[J]. Application Research of Computers, 2012, 29(4):1430-1433, 1444. [14] LI J G, WANG Z W, ZHANG Y C. Provably secure certificate-based signature scheme without pairings[J]. Information Sciences, 2013, 233(7):313-320. [15] 周萍, 何大可, 张文芳. 具有强安全性不含双线性对的基于证书盲签名[J]. 四川大学学报(工程科学版), 2013, 45(4):111-116. ZHOU Ping, HE Dake, ZHANG Wenfang. Strongly secure certificate-based blind signature scheme without pairings[J]. Journal of Sichuan University(Engineering Science Edition), 2013, 45(4):111-116. [16] 冯达, 王强, 赵译文, 等. 基于SGX的证书可信性验证与软件安全签发系统[J]. 信息网络安全, 2018(3):63-69. FENG Da, WANG Qiang, ZHAO Yiwen, et al. SGX-based certificate credibility verification and secure software issuance system[J]. Netinfo Security, 2018(3):63-69. |
[1] | FAN Ai-wan, XIA Dong-liang, YANG Zhao-feng. Security analysis and improvement of two certificateless aggregate signature schemes [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2015, 50(09): 42-48. |
[2] | YAN Zhao-xiang. Chosen cipher-text security proof of ZS encryption scheme [J]. J4, 2010, 45(11): 115-121. |
[3] | LIU Xiao-dong,JIANG Ya-li,LI Da-xing . Two biometric identities based signature schemes [J]. J4, 2007, 42(12): 24-28 . |
|