Citation: | Caifen WANG, Qinbai XU, Chao LIU, Yudan CHENG, Bing ZHAO. Partial Blind Signcryption Scheme in CLPKC-to-TPKI Heterogeneous Environment[J]. Journal of Electronics & Information Technology, 2019, 41(8): 1823-1830. doi: 10.11999/JEIT180850 |
HU Xiaoming, LIU Yan, XU Huajie, et al. Analysis and improvement of certificateless signature and proxy re-signature schemes[C]. 2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference, Chongqing, China, 2015: 166–170. doi: 10.1109/IAEAC.2015.7428540.
|
JIANG M M, HU Y P, WANG B C, et al. Lattice‐based multi‐use unidirectional proxy re‐encryption[J]. Security and Communication Networks, 2015, 8(18): 3796–3803. doi: 10.1002/sec.1300
|
邓宇乔, 杜明辉, 尤再来, 等. 一种基于标准模型的盲代理重签名方案[J]. 电子与信息学报, 2010, 32(5): 1219–1223. doi: 10.3724/SP.J.1146.2009.00754
DENG Yuqiao, DU Minghui, YOU Zailai, et al. A blind proxy re-signatures scheme based on standard model[J]. Journal of Electronics &Information Technology, 2010, 32(5): 1219–1223. doi: 10.3724/SP.J.1146.2009.00754
|
刘哲, 刘建伟, 伍前红, 等. 车载网络中安全有效分布式的假名生成[J]. 通信学报, 2015, 36(11): 33–40. doi: 10.11959/j.issn.1000-436x.2015253
LIU Zhe, LIU Jianwei, WU Qianhong, et al. Secure and efficient distributed pseudonym generation in VANET[J]. Journal on Communications, 2015, 36(11): 33–40. doi: 10.11959/j.issn.1000-436x.2015253
|
李建民, 俞惠芳, 赵晨. UC安全的自认证盲签密协议[J]. 计算机科学与探索, 2017, 11(6): 932–940. doi: 10.3778/j.issn.1673-9418.1605047
LI Jianmin, YU Huifang, and ZHAO Chen. Self-certified blind signcryption protocol with UC security[J]. Journal of Frontiers of Computer Science and Technology, 2017, 11(6): 932–940. doi: 10.3778/j.issn.1673-9418.1605047
|
傅晓彤, 陈思, 张宁. 基于代理的密码货币支付系统[J]. 通信学报, 2017, 38(7): 199–206. doi: 10.11959/j.issn.1000-436x.2017121
FU Xiaotong, CHEN Si, and ZHANG Ning. Proxy-cryptocurrency payment system[J]. Journal on Communications, 2017, 38(7): 199–206. doi: 10.11959/j.issn.1000-436x.2017121
|
SUN Yinxia and LI Hui. Efficient signcryption between TPKC and IDPKC and its multi-receiver construction[J]. Science China Information Sciences, 2010, 53(3): 557–566. doi: 10.1007/s11432-010-0061-5
|
HUANG Qiang, WONG D S, and YANG Guomin. Heterogeneous signcryption with key privacy[J]. The Computer Journal, 2011, 54(4): 525–536. doi: 10.1093/comjnl/bxq095
|
张玉磊, 张灵刚, 张永洁, 等. 匿名CLPKC-TPKI异构签密方案[J]. 电子学报, 2016, 44(10): 2432–2439. doi: 10.3969/j.issn.0372-2112.2016.10.022
ZHANG Yulei, ZHANG Linggang, ZHANG Yongjie, et al. CLPKC-to-TPKI heterogeneous signcryption scheme with anonymity[J]. Acta Electronica Sinica, 2016, 44(10): 2432–2439. doi: 10.3969/j.issn.0372-2112.2016.10.022
|
冯涛, 彭伟, 马建峰. 安全的无可信PKG的部分盲签名方案[J]. 通信学报, 2010, 31(1): 128–134. doi: 10.3969/j.issn.1000-436X.2010.01.020
FENG Tao, PENG Wei, and MA Jianfeng. Provably secure partially blind signature without trusted PKG[J]. Journal on Communications, 2010, 31(1): 128–134. doi: 10.3969/j.issn.1000-436X.2010.01.020
|
杨小东, 陈春霖, 杨平, 等. 可证安全的部分盲代理重签名方案[J]. 通信学报, 2018, 39(2): 65–72. doi: 10.11959/j.issn.1000-436x.2018014
YAGN Xiaodong, CHEN Chunlin, YANG Ping, et al. Partially blind proxy re-signature scheme with proven security[J]. Journal on Communications, 2018, 39(2): 65–72. doi: 10.11959/j.issn.1000-436x.2018014
|
BARBOSA M and FARSHIM P. Certificateless signcryption[C]. 2008 ACM Symposium on Information, Computer and Communications Security, Tokyo, Japan, 2008: 369–372.
|
彭巧, 田有亮. 基于多线性Diffie-Hellman问题的秘密共享方案[J]. 电子学报, 2017, 45(1): 200–205. doi: 10.3969/j.issn.0372-2112.2017.01.027
PENG Qiao and TIAN Youliang. A secret sharing scheme based on multilinear Diffie-Hellman problem[J]. Acta Electronica Sinica, 2017, 45(1): 200–205. doi: 10.3969/j.issn.0372-2112.2017.01.027
|
POINTCHEVAL D and STERN J. Security arguments for digital signatures and blind signatures[J]. Journal of Cryptology, 2000, 13(3): 361–396. doi: 10.1007/s001450010003
|
牛淑芬, 杨喜艳, 王彩芬, 等. 基于异构密码系统的混合盲签密方案[J]. 计算机工程, 2018, 44(8): 151–154, 160. doi: 10.19678/j.issn.1000-3428.0047898
NIU Shufen, YANG Xiyan, WANG Caifen, et al. Hybrid blind signcryption scheme based on heterogeneous cryptosystem[J]. Computer Engineering, 2018, 44(8): 151–154, 160. doi: 10.19678/j.issn.1000-3428.0047898
|