Computer Science ›› 2020, Vol. 47 ›› Issue (9): 304-310.doi: 10.11896/jsjkx.200500002
• Information Security • Previous Articles Next Articles
LIU Shuai, CHEN Jian-hua
CLC Number:
[1] PIATKOWSKA E,BAJRAKTARI A,CHHAJED D,et al.Tool support for data protection impact assessment in the smart grid[J].Elektrotechnik und Information stechnik,2017,134(1):26-29. [2] DENG W,WEN K,ZHANG H,et al.Design and analysis of data encryption and authentication scheme for distribution grid[J].Computer Engineering & Software,2017,38(6):17-23. [3] AL-RIYAMI S,PATERSON K G.Certificateless public keycryptography[C]//Advances in Cryptology-ASIACRYPT’03.Berlin:Springer-Verlag,2003. [4] ZOU X F,XIAO Y X.Modbus telegram security of distribution network based on SM2[J].Power System Protection and Control,2018,46(12):151-157. [5] QIU F,CHEN LL,LIN N,et al.Security analysis and improvement of Modbus message in distribution network based on SM9 [J].China Power,2019,52 (10):18-25. [6] ZHANG Z H,ZHOU J,DING K,et al.The Applications of Asymmetric Encryption of Digital Signature Technology in Distribution Automation System[J].Electrical Automation,2012(3):43-45. [7] ENGE A.Elliptic Curves and Their Applications to Cryptography-An Introduction[M].Kluwer Academic Publishers,1999:39-40. [8] WU T,JING X J.Cryptanalysis and Improvement of a Certificateless Signature Scheme with Strong Unforgeability[J].Acta Electronica Sinica,2018,46(3):602-606. [9] HUANG X,Mu Y,SUSILO W,et al.Certificateless Signature Revisited[C]// Australasian Conference on Information Security & Privacy.Washington D.C.,USA:IEEE Press,2007:308-322. [10] POINTCHEVAL D,STERN J.Security Arguments for Digital Signatures and Blind Signatures[J].Journal of Cryptology,2000,13(3):361-396. [11] HE D B,CHEN J H,ZHANG R.An efficient and provably-secure certificateless signature scheme without bilinear pairings[J].International Journal of Communication Systems,2011,25(11):1432-1442. [12] HASSOUNA M,BASHIER E,BARRY B.A Strongly SecureCertificateless Digital Signature Scheme in The Random Oracle Model[J].International Journal of Network Security,2016,18(5):938-945. [13] ZHANG Y,DENG R,ZHENG D,et al.Efficient and Robust Certificateless Signature for Data Crowdsensing in Cloud-assisted Industrial IoT[J].IEEE Transactions on Industrial Informatics,2019,15(9):5099-5108. [14] KRISHNAMOORTHY M,PERUMAL V.Secure and efficient hand-over authentication in WLAN using elliptic curve RSA[J].Computers & Electrical Engineering,2017,64:552-566. [15] KARATI A,ISLAM S H,BISWAS G P.A Pairing-free andProvably Secure Certificateless Signature Scheme[J].Information Sciences,2018,450:378-391. [16] JIA X Y,HE D B,LIU Q,et al.An efficient provably-securecertificateless signature scheme for Internet-of-Things deployment[J].Ad Hoc Networks,2018,71(15):78-87. |
[1] | ZHANG Zhen-chao, LIU Ya-li, YIN Xin-chun. New Certificateless Generalized Signcryption Scheme for Internet of Things Environment [J]. Computer Science, 2022, 49(3): 329-337. |
[2] | WANG Xi-long, LI Xin, QIN Xiao-lin. Collaborative Scheduling of Source-Grid-Load-Storage with Distributed State Awareness UnderPower Internet of Things [J]. Computer Science, 2021, 48(2): 23-32. |
[3] | YE Sheng-nan, CHEN Jian-hua. Security Analysis and Improvement of Strongly Secure Certificateless Digital Signature Scheme [J]. Computer Science, 2021, 48(10): 272-277. |
[4] | ZHENG Yi-neng. Research on Key Technologies of Quantum Channel Management in QKD Network [J]. Computer Science, 2018, 45(6A): 356-363. |
[5] | HU Xiao-ming, MA Chuang, SI Tao-zhi, JIANG Wen-rong, XU Hua-jie and TAN Wen-an. Improved Certificateless Aggregate Signature Scheme with Universal Designated Verifier [J]. Computer Science, 2017, 44(8): 168-175. |
[6] | CHEN Yan, WU Zan-hong, WANG Bo, REN Hai-jun and KONG Wei-chan. Key Technology of Access Network Supporting in Intelligent Power Distribution Business [J]. Computer Science, 2016, 43(Z6): 558-560. |
[7] | ZHANG Gui-jun, XIA Hua-dong, ZHOU Xiao-gen and ZHANG Bei-jin. Hybrid Differential Evolution Based on Tabu Search Algorithm for Distribution Network Line Planning [J]. Computer Science, 2016, 43(10): 248-255. |
[8] | ZHANG Yi-chen, LI Ji-guo and QIAN Na. Certificateless Strong Designated Verifier Signature Scheme [J]. Computer Science, 2015, 42(3): 132-135. |
[9] | . Certificateless Signature Scheme without Public Key Replaced [J]. Computer Science, 2012, 39(8): 92-95. |
[10] | . [J]. Computer Science, 2009, 36(2): 11-14. |
[11] | ZHAO Jin ,ZHANG Fu-Yan (Department of Computer Science and Technology. Nanjing University, Nanjing 210093). [J]. Computer Science, 2006, 33(12): 114-116. |
|