Computer Science ›› 2019, Vol. 46 ›› Issue (4): 172-176.doi: 10.11896/j.issn.1002-137X.2019.04.027
• Information Security • Previous Articles Next Articles
ZUO Li-ming1,2, CHEN Zuo-song1,2, XIA Ping-ping1,2, TANG Peng-zhi1, KANG Wen-yang1,2
CLC Number:
[1]SHAMIR A.Identity-based cryptosystems and signature sche- mes[C]∥Workshop on the theory and application of cryptographic techniques.Berlin Heidelberg:Springer,1984:47-53. [2]AL-RIYAMI S S,PATERSON K G.Certificateless public key cryptography[C]∥International Conference on the Theory and Application of Cryptology and Information Security.Berlin Heidelberg:Springer,2003:452-473. [3]DU H,WEN Q.Efficient and provably-secure certificateless short signature scheme from bilinear pairings[J].Computer Standards & Interfaces,2009,31(2):390-394. [4]ISLAM S K H,BISWAS G P.Provably secure and pairing-free certificateless digital signature scheme using elliptic curve cryptography[J].International Journal of Computer Mathematics,2013,90(11):2244-2258. [5]HORNG S J,TZENG S F,HUANG P H,et al.An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks[J].Information Sciences,2015,317(C):48-66. [6]DU H Z.A Secure and Efficient Certificateless Signature Scheme in the Standard Model[C]∥ The International Con-ference on Computer Science and Technology.Singapore:World Scientific,2017:278-286. [7]KARATI A,ISLAM S H,KARUPPIAH M.Provably Secure and Lightweight Certificateless Signature Scheme for IIoT Environments[J].IEEE Transactions on Industrial Informatics,2018,PP(99):1-1. [8]TSAI J L,LO N W,WU T C.Weaknesses and improvements of an efficient certificateless signature scheme without using bilinear pairings[J].International Journal of Communication Systems,2014,27(7):1083-1090. [9]LIU E G,WANG X,ZHOU H J,et al.Improved Certificateless Proxy Blind Signature Scheme[J].Computer Science,2016,43(8):92-94.(in Chinese) 刘二根,王霞,周华静,等.改进的无证书代理盲签名方案[J].计算机科学,2016,43(8):92-94. [10]CHANG S,LEE H S,LEE J,et al.Security Analysis of a Certificateless Signature from Lattices[J/OL].http://www.hidawi.com/journals/scn/2017/3413567/. [11]GONG P,LI P.Further improvement of a certificateless signature scheme without pairing[J].International Journal of Communication Systems,2015,27(10):2083-2091. [12]BHATIA T,VERMA A K.Cryptanalysis and improvement of certificateless proxy signcryption scheme for eprescription system in mobile cloud computing[J].Annals of Telecommunications,2017,72(9-10):563-576. [13]LI J,YUAN H,ZHANG Y.Cryptanalysis and Improvement for Certificateless Aggregate Signature[J].Fundamenta Informaticae,2018,157(1-2):111-123. [14]HU X M,LIU Y,XU H J,et al.Analysis and Improvement of Two Certificateless Signature Scheme[J].Journal of Chinese Computer Systems,2016,37(10):2264-2268. [15]ZHANG L,ZHANG F T.A Method to Constr-uct a Class of Certificateless Signature Schemes [J].Chinese Journal of Computers,2009,32(5):940-945. [16]LI X,CHEN K,SUN L.Certificateless signatu-re and proxy signature schemes from bilinear pairin-gs[J].Lithuanian Mathematical Journal,2005,45(1):76-83. [17]YAP W S,HENG S H,GOI B M.An efficient certificateless signature scheme[C]∥International Conference on Embedded and Ubiquitous Computing.Berlin Heidelberg:Springer,2006:322-331. [18]GORANTLA M C,SAXENA A.An efficient certificateless signature scheme[C]∥Computational Intelligence and Security.Berlin Heidelberg:Springer,2005:110-116. [19]ZHANF Y Q,LU W L,TANG C M.Research on An Efficient and Practical Cloud-based Digital Signature Scheme[J].Netinfo Security,2016,2016(7):1-6. |
[1] | YE Sheng-nan, CHEN Jian-hua. Security Analysis and Improvement of Strongly Secure Certificateless Digital Signature Scheme [J]. Computer Science, 2021, 48(10): 272-277. |
[2] | ZHANG Jun-he, ZHOU Qing-lei and HAN Ying-Jie. Sanitizable Signature Scheme Based on Ring Signature and Short Signature [J]. Computer Science, 2020, 47(6A): 386-390. |
[3] | CHEN Shao-hua, FAN Xiao-guang, CONG Wei, HUANG Jin-ke and SUN Xian-ming. Grid-based Identity Signcryption Algorithm and Application in Ad Hoc Network [J]. Computer Science, 2017, 44(6): 168-173. |
[4] | ZHU Jun, YUAN Xiao-feng, GOU Zhi-nan and YANG Yi. Certificateless Threshold Decryption Scheme for Data Security of Recommendation System [J]. Computer Science, 2017, 44(11): 253-263. |
[5] | SUN Ling,TIAN Yuan and HUANG Hou-biao. Nodes Key Agreement Scheme between Clusters in Aeronautical Mobile Ad hoc Network [J]. Computer Science, 2014, 41(Z6): 369-373. |
[6] | ZHOU Cai-xue and TAN Xu-jie. Certificate-based Multi-proxy Multi-signature Scheme [J]. Computer Science, 2014, 41(Z11): 272-276. |
[7] | WEI Yun,WEI Fu-shan and MA Chuan-gui. Non-interactive Key Exchange Protocol Based on Certificateless Public Key Cryptography [J]. Computer Science, 2014, 41(12): 101-106. |
[8] | WANG Dian-gang,DING Xue-feng and HUANG Kun. Security Analysis and Improvement of Strongly Secure Certificateless Key Agreement Protocol [J]. Computer Science, 2013, 40(Z11): 203-209. |
[9] | LIU Qing-hua,SONG Yu-qing and LIU Yi. Efficient Content Extraction Signature Scheme without Certification [J]. Computer Science, 2013, 40(8): 136-139. |
[10] | FU Xiao-jing,ZHANG Guo-yin and MA Chun-guang. Dynamic Threshold Attributes-based Signature Scheme [J]. Computer Science, 2013, 40(7): 93-97. |
[11] | LI Chao-ling,CHEN Yue,WANG Cheng-liang,LI Wen-jun and WANG Shuang-jin. Identity-based Broadcast Signcryption with Proxy Re-signature [J]. Computer Science, 2013, 40(5): 153-157. |
[12] | ZHOU Cai-xue. ID-based Generalized Signcryption without Trusted Party [J]. Computer Science, 2013, 40(4): 142-146. |
[13] | SUN Hua and ZHENG Xue-feng. Provably Secure and Efficient Certificateless Signcryption Scheme [J]. Computer Science, 2013, 40(11): 112-116. |
[14] | ZHOU Cai-xue and WANG Fei-peng. Improved Certificateless Signcryption Scheme without Pairing [J]. Computer Science, 2013, 40(10): 139-143. |
[15] | . Efficient Identity Based Online/Offline Signcryption Scheme [J]. Computer Science, 2012, 39(8): 42-46. |
|