Computer Science ›› 2020, Vol. 47 ›› Issue (11): 60-67.doi: 10.11896/jsjkx.191100068
Special Issue: Intelligent Mobile Authentication
• Intelligent Mobile Authentication • Previous Articles Next Articles
JIANG Ze-tao, XU Juan-juan
CLC Number:
[1] FENG D G,ZHANG M,ZHANG Y,et al.Study on Cloud Computing Security[J].Journal of Software,2011,22(1):71-83. [2] LIN J Q,JING J W,ZHANG Q L,et al.Recent advances in PKI technologies[J].Journal of Cryptologic Research,2015,2(6):487-496. [3] ZHANG F T,SUN Y X,ZHANG L,et al.Research on Certificateless Public Key Cryptography[J].Journal of Software,2011,22(6):1316-1332. [4] BINU S,MOHAMMED M,RAJ P.A Mobile Based Remote User Authentication Scheme without Verifier Table for Cloud Based Services[C]//Proceedings of the 3rd International Symposium on Women in Computing and Informatics.New York,USA:ACM Press,2015:502-509. [5] DONG Z,ZHANG L,LI J.Security Enhanced Anonymous Remote User Authentication and Key Agreement for Cloud Computing[C]//Proceedings of the 17th International Conference on Computational Science and Engineering.IEEE Computer Society Press,2014:1746-1751. [6] YANG X D,AN F I,YANG P,et al.Cross-domain Identity Authentication Scheme in Cloud Based on Certificateless Signature[J].Computer Engineering,2017,43(11):128-133,145. [7] YANG X D,AN F Y,YANG P,et al.Cross-Domain Authentication Scheme Based on Proxy Re-signature in Cloud Environment[J].Chinese Journal Of Computers,2017,42(4):82-97. [8] XIE Y R,MA W P,LUO W.New cross-domain authentication mode for information services entity[J].Computer Science,2018,45(9):177-182. [9] WANG Y,WANG Y L.A Heterogeneous Cross-Domain Au-thentication Model Based on Access Tickets in Virtual Cable Television Network[J].Applied Mechanics and Materials,2015,742:717-720. [10] MA X T,MA W P,LIU X X.A Cross Domain Authentication Scheme Based on Blockchain Technology[J].Acta Electronica Sinica,2018,46(11):13-21. [11] HE D,ZEADALLY S,KUMAR N,et al.Anonymous Authentication for Wireless Body Area Networks With Provable Security[J].IEEE Systems Journal,2016,11(4):2590-2601. [12] ZHOU Z C,LI L X,LI Z H.Efficient cross-domain authentication scheme based on blockchain technology[J].Journal of Computer Applications,2018,38(2):316-320,326. [13] SHI Y H,LI W S.A Survey of Blind Signature Studies[J].Computer Engineering & Science,2005,27(7):83-85. [14] YANG X D,CHEN C L,YANG P,et al.Partially blind proxyre-signature scheme with proven security[J].Journal on Communications,2018,39(2):65-72. [15] ZHAI Z Y,GAO D Z,LIANG X Q,et al.Certificate-based proxyblind signature scheme[J].Computer Engineering and Applications,2014,50(4):57-62. [16] WANG C F,XU Q B,LIU C,et al.Partial Blind Signcryption Scheme in CLPKC-to-TPKI Heterogeneous Environment[J].Journal of Electronics & Information Technology,2019,41(8):77-85. [17] NI L,CHEN G,LI J,et al.Strongly secure identity-based authenticated key agreement protocols without bilinear pairings[J].Information Sciences,2016,37(2):205-217. [18] GE R L,GAO D Z,LIANG J L,et al.Security analysis and improvement of certificateless proxy blind signature[J].Journal of Computer Applications,2012,32(3):705-706,714. [19] WANG Z H,HAN Z,LIU J Q,et al.ID authentication scheme based on PTPM and certificateless public key cryptography in cloud environment[J].Journal of Software,2016,27(6):1523-1537. [20] LIU S,ZHU S H.Identity Authentication Scheme in Multi-ser-ver Environment[J].Computer Engineering,2015,41(3):120-124. [21] YUAN C,ZHANG W,WANG X,et al.Heterogeneous Cross-Domain Authenticated Key Agreement Protocols in the EIM System[J].Arabian Journal for Science & Engineering,2017,42(8):3275-3287. |
[1] | JIANG Hao-kun, DONG Xue-dong, ZHANG Cheng. Improved Certificateless Proxy Blind Signature Scheme with Forward Security [J]. Computer Science, 2021, 48(6A): 529-532. |
[2] | WANG Xing-wei, HOU Shu-hui. Improved Efficient Proxy Blind Signature Scheme [J]. Computer Science, 2019, 46(6A): 358-361. |
[3] | LIU Er-gen, WANG Xia, ZHOU Hua-jing and GUO Hong-li. Improved Certificateless Proxy Blind Signature Scheme [J]. Computer Science, 2016, 43(8): 92-94. |
|