Computer Science ›› 2021, Vol. 48 ›› Issue (10): 272-277.doi: 10.11896/jsjkx.201200117
• Information Security • Previous Articles Next Articles
YE Sheng-nan, CHEN Jian-hua
CLC Number:
[1]SHAMIR A.Identity-Based Cryptosystems and SignatureSchemes[C]//Workshop on the Theory & Application of Cryptographic Techniques.Berlin:Springer,1984. [2]BARRETO P S L M,KIM H Y,LYNN B,et al.Efficient Algorithms for Pairing-Based Cryptosystems[C]//International Cryptology Conference on Advances in Cryptology.Berlin:Springer,2002. [3]BARRETO P,LYNN B,SCOTT M.Constructing EllipticCurves with Prescribed Embedding Degrees[C]//Springer Berlin Heidelberg.Berlin:Springer, 2003. [4]BONEH D,LYNN B,SHACHAM H.Short Signatures from the Weil Pairing[C]//International Conference on the Theory and Application of Cryptology and Information Security.Berlin:Springer,2001. [5]HESS F.Efficient Identity Based Signature Schemes Based on Pairings[C]//International Workshop on Selected Areas in Cryptography.Berlin:Springer, 2003. [6]RIYAMI S S,PATERSON K G.Certificateless Public KeyCryptography[C]//International Conference on the Theory and Application of Cryptology and Information Security.Berlin:Springer,2003. [7]DENT A W,BENOÎT L,PATERSON K G.Certificateless encryption schemes strongly secure in the standard model[C]//Public Key Cryptography-PKC 2008,11th International Workshop on Practice and Theory in Public-Key Cryptography,Barcelona,Spain,2008.Berlin:Springer,2008. [8]VIVEK S S,SELVI S S D,RANGAN C P.CCA2 Secure Certificateless Encryption Schemes Based on RSA[C]//International Conference on Security & Cryptography.IEEE,2014. [9]WANG C,HUANG H,TANG Y.An Efficient CertificatelessSignature from Pairings[C]//International Symposium on Data.IEEE,2007. [10]XIONG H,QIN Z,LI F.An Improved Certificateless Signature Scheme Secure in the Standard Model[J].Fundamenta Informa-ticae,2008,88(1):193-206. [11]ZHANG L,ZHANG F.A New Provably Secure Certificateless Signature Scheme[C]//IEEE International Conference on Communications.IEEE,2008. [12]SHIM K A.Forgery Attacks on Two Provably Secure Certificateless Signature Schemes[J].Information Sciences,2020,521:81-87. [13]YANG X,PEI X,CHEN G,et al.A Strongly Unforgeable Certificateless Signature Scheme and Its Application in IoT Environments[J].Sensors,2019,19(12):2692. [14]HUANG L,ZHOU J,ZHANG G,et al.Certificateless PublicVerification for the Outsourced Data Integrity in Cloud Storage[J].Journal of Circuits,Systems and Computers,2018,27(11):1850181.1-1850181.17. [15]YANG X D,WANG M D,PEI X Z,et al.Security Analysis and Improvement of a Certificateless Signature Scheme in theStan-dard Model[J].Acta Electronica Sinica,2019,47(9):1972-1978. [16]DU H Z,WEN Q Y,ZHANG S S,et al.A new provably secure certificateless signature scheme for Internet of Things[J].Ad Hoc Networks,2019,100:102074. [17]YANG X,PEI X,CHEN G,et al.A Strongly Unforgeable Certificateless Signature Scheme and Its Application in IoT Environments[J].Sensors,2019,19(12):2692. [18]SELVI S S D,VIVEK S S,RANGAN C P.Certificateless KEM and Hybrid Signcryption Schemes Revisited[C]//International Conference on Information Security Practice and Experience.Berlin:Springer,2010. [19]XIE W,ZHANG Z.Certificateless signcryption without pairing[J/OL].IACR Cryptology ePrint Archive,2010,187.https://www.researchgate.net/publication/220336349_Certificateless_Signcryption_without_Pairing. [20]XIE W,ZHANG Z.Efficient and provably secure certificateless signcryption from bilinear maps[C]//IEEE International Conference on Wireless Communications.IEEE,2010. [21]HASSOUNA M,BASHIER E,BARRY B.A Short Certificateless Digital Signature Scheme[C]//International Conference of Digital Information Processing,Data Mining and Wireless Communications.2015. [22]HASSOUNA M,BASHIER E,BARRY B.A Strongly SecureCertificateless Digital Signature Scheme in The Random Oracle Model[J].International Journal of Network Security,2016,18(5):938-945. [23]HUANG X,MU Y,SUSILO W,et al.Certificateless Signature Revisited[C]//Australasian Conference on Information Security &Privacy.Springer-Verlag,2007. [24]ZHANG Z,WONG D S,XU J,et al.Certificateless Public-Key Signature:Security Model and Efficient Construction[C]//International Conference on Applied Cryptography & Network Security.Springer-Verlag,2006. [25]CHEN J S,HUANG Z J.Efficient certificbased signature schenle[J].Computer Engineering Applications,2012,48(30):98-102. [26]LIU J K, BAEK J, SUSILO W,et al.Certificate-Based Signature Schemes without Pairings or Random Oracles[C]//Information Security,International Conference,Isc,Taipei,Taiwan,September.Berlin:Springer,2008. [27]MING Y,WANG Y M.Efficient Certificateless SignatureScheme Based on Bilinear Pairings[J].Journal of University of Electronic Science and Technology of China,2008,37(2):175-177. |
[1] | ZHANG Zhen-chao, LIU Ya-li, YIN Xin-chun. New Certificateless Generalized Signcryption Scheme for Internet of Things Environment [J]. Computer Science, 2022, 49(3): 329-337. |
[2] | LIU Shuai, CHEN Jian-hua. Certificateless Signature Scheme Without Bilinear Pairings and Its Application in Distribution Network [J]. Computer Science, 2020, 47(9): 304-310. |
[3] | ZUO Li-ming, CHEN Zuo-song, XIA Ping-ping, TANG Peng-zhi, KANG Wen-yang. Improved Efficient Certificateless Short Signature Scheme [J]. Computer Science, 2019, 46(4): 172-176. |
[4] | YUAN Chao, XU Mi-xue and SI Xue-ming. Optimization Scheme of Consensus Algorithm Based on Aggregation Signature [J]. Computer Science, 2018, 45(2): 53-56. |
[5] | DING Qing-yang, WANG Xiu-li, ZHU Jian-ming and SONG Biao. Information Security Framework Based on Blockchain for Cyber-physics System [J]. Computer Science, 2018, 45(2): 32-39. |
[6] | HU Xiao-ming, MA Chuang, SI Tao-zhi, JIANG Wen-rong, XU Hua-jie and TAN Wen-an. Improved Certificateless Aggregate Signature Scheme with Universal Designated Verifier [J]. Computer Science, 2017, 44(8): 168-175. |
[7] | CHEN Shao-hua, FAN Xiao-guang, CONG Wei, HUANG Jin-ke and SUN Xian-ming. Grid-based Identity Signcryption Algorithm and Application in Ad Hoc Network [J]. Computer Science, 2017, 44(6): 168-173. |
[8] | ZHU Jun, YUAN Xiao-feng, GOU Zhi-nan and YANG Yi. Certificateless Threshold Decryption Scheme for Data Security of Recommendation System [J]. Computer Science, 2017, 44(11): 253-263. |
[9] | MA Yuan-yuan, CHEN Zhe, WANG Chen, FEI Jia-xuan and HUANG Xiu-li. Security Analysis Model of Power Intelligent Unit Transmission Protocols [J]. Computer Science, 2016, 43(Z11): 329-337. |
[10] | ZHANG Yi-chen, LI Ji-guo and QIAN Na. Certificateless Strong Designated Verifier Signature Scheme [J]. Computer Science, 2015, 42(3): 132-135. |
[11] | SUN Ling,TIAN Yuan and HUANG Hou-biao. Nodes Key Agreement Scheme between Clusters in Aeronautical Mobile Ad hoc Network [J]. Computer Science, 2014, 41(Z6): 369-373. |
[12] | ZHOU Cai-xue and TAN Xu-jie. Certificate-based Multi-proxy Multi-signature Scheme [J]. Computer Science, 2014, 41(Z11): 272-276. |
[13] | WEI Yun,WEI Fu-shan and MA Chuan-gui. Non-interactive Key Exchange Protocol Based on Certificateless Public Key Cryptography [J]. Computer Science, 2014, 41(12): 101-106. |
[14] | WANG Dian-gang,DING Xue-feng and HUANG Kun. Security Analysis and Improvement of Strongly Secure Certificateless Key Agreement Protocol [J]. Computer Science, 2013, 40(Z11): 203-209. |
[15] | LIU Qing-hua,SONG Yu-qing and LIU Yi. Efficient Content Extraction Signature Scheme without Certification [J]. Computer Science, 2013, 40(8): 136-139. |
|