Computer Science ›› 2019, Vol. 46 ›› Issue (6A): 358-361.
• Information Security • Previous Articles Next Articles
WANG Xing-wei, HOU Shu-hui
CLC Number:
[1]CHAUM D.Blind Signature for Untraceable Payments[C]∥Advance in Cryptology:Proceedings of Crypto’82.1983:199-203. [2]MAMBO M,USUDA K,OKAMOTO E.Proxy signa-ture for delegating signing operation[C]∥Proceedings of the 3rd ACM Conference on Computer and Communications Security.ACM,1996:48-57. [3]LIN W D,JAN J K.A security personal learning tools using a proxy blind signature scheme[C]∥Proc of International Conference on Chinese Language Computing.2000:273-277. [4]计国民.双线性对代理盲签名在电子选举中的应用[J].菏泽学院学报,2015,37(2):20-23. [5]左黎明,郭红丽,张婷婷,等.一种无双线性对的代理盲签名方案[J].华东交通大学学报,2016,33(5):139-142. [6]韩春霞,王琳杰.两种代理盲签名方案的安全性分析[J].科技信息,2013,23:53-61. [7]林振宇,贺亚威,侯整风.改进的代理盲签名方案[J].合肥工业大学学报(自然科学版),2015,38(1):40-43. [8]张瑛瑛,陈玮,曾吉文.对一个无证书代理盲签名方案的分析与改进[J].计算机应用研究,2014,31(2):540-542. [9]农强,吴顺祥.一种基于身份的代理盲签名的分析与改进[J].计算机应用,2008,28(8):1940-1942. [10]张晓敏.一类高效的无证书代理盲签名方案[J].计算机安全,2011(3):54-59. [11]文佳骏,左黎明,李彪.一个高效的无证书代理盲签名方案[J].计算机工程与科学,2014,36(3):452-457. [12]周明,王箭.一个可证安全的高效的代理盲签名方案[J].计算机工程与科学,2015,37(9):1643-1651. [13]BARRETO P S L M.GALBRAITH S D,O’HEIGEARTAIGH C,et al.Efficient pairing computation on super singular abelian varieties[J].Designs,Codes and Cryptography,2007,42(3):239-271. [14]梁林.一种新的基于身份的代理盲签名方案[J].赤峰学院学报(自然科学版)2017,33(2):22-24. [15]刘二根,王霞,周华静,等.改进的无证书代理盲签名方案[J].计算机科学,2016,43(8):92-94. |
[1] | REN Chang, ZHAO Hong, JIANG Hua. Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [J]. Computer Science, 2022, 49(5): 333-340. |
[2] | JIANG Hao-kun, DONG Xue-dong, ZHANG Cheng. Improved Certificateless Proxy Blind Signature Scheme with Forward Security [J]. Computer Science, 2021, 48(6A): 529-532. |
[3] | DAI Chuang-chuang, LUAN Hai-jing, YANG Xue-ying, GUO Xiao-bing, LU Zhong-hua, NIU Bei-fang. Overview of Blockchain Technology [J]. Computer Science, 2021, 48(11A): 500-508. |
[4] | ZHANG Jun-he, ZHOU Qing-lei and HAN Ying-Jie. Sanitizable Signature Scheme Based on Ring Signature and Short Signature [J]. Computer Science, 2020, 47(6A): 386-390. |
[5] | JIANG Ze-tao, XU Juan-juan. Efficient Heterogeneous Cross-domain Authentication Scheme Based on Proxy Blind Signature in Cloud Environment [J]. Computer Science, 2020, 47(11): 60-67. |
[6] | ZUO Li-ming,CHEN Lan-lan. Special Digital Signature Scheme Based on Identity Identification and Its Application [J]. Computer Science, 2020, 47(1): 309-314. |
[7] | LIU Ya-qiang,LI Xiao-yu. Mobile Secure Payment Scheme Using Identity-based Cryptographic Algorithm+SMS Verification Code [J]. Computer Science, 2020, 47(1): 293-301. |
[8] | LI Lei, JIA Hui-wen, BAN Xue-hua and HE Yu-fan. Obfuscation-based Broadcasting Multi-signature Scheme [J]. Computer Science, 2017, 44(Z11): 329-333. |
[9] | YE Jun-yao, ZHENG Dong and REN Fang. Improved Veron’s Identification with Lightweight Structure and Digital Signature Scheme [J]. Computer Science, 2017, 44(3): 168-174. |
[10] | LIU Er-gen, WANG Xia, ZHOU Hua-jing and GUO Hong-li. Improved Certificateless Proxy Blind Signature Scheme [J]. Computer Science, 2016, 43(8): 92-94. |
[11] | REN Yan. Deniable Attribute-based Designated Confirmer Signature without Random Oracles [J]. Computer Science, 2016, 43(7): 162-165. |
[12] | WANG Hu-qing and SUN Zhi-xin. Research on ONS Security [J]. Computer Science, 2016, 43(1): 1-7. |
[13] | LIU Ya-li, QIN Xiao-lin, ZHAO Xiang-jun, HAO Guo-sheng and DONG Yong-quan. Lightweight RFID Authentication Protocol Based on Digital Signature [J]. Computer Science, 2015, 42(2): 95-99. |
[14] | ZHOU Ke-yuan. Digital Signature Scheme Based on Elliptic Curve and Factoring [J]. Computer Science, 2014, 41(Z6): 366-368. |
[15] | CAO Shuai and WANG Shu-ying. Research on Security Technology of Workflow Customization for Collaborative SaaS Platform of Industrial Chains [J]. Computer Science, 2014, 41(1): 230-234. |
|