WANG Zicheng, MA Yongxing, WANG Yanfeng, SUN Junwei. Design of Locally Active Memristor Coupled Heterogeneous Neurons and Its Application to DNA Encoded Image Encryption[J]. Journal of Electronics & Information Technology, 2023, 45(9): 3359-3369. doi: 10.11999/JEIT221493
Citation:
Gu LiZe, Zhang Sheng, Yang YiXian. A New Proxy Signature Scheme[J]. Journal of Electronics & Information Technology, 2005, 27(9): 1463-1466.
WANG Zicheng, MA Yongxing, WANG Yanfeng, SUN Junwei. Design of Locally Active Memristor Coupled Heterogeneous Neurons and Its Application to DNA Encoded Image Encryption[J]. Journal of Electronics & Information Technology, 2023, 45(9): 3359-3369. doi: 10.11999/JEIT221493
Citation:
Gu LiZe, Zhang Sheng, Yang YiXian. A New Proxy Signature Scheme[J]. Journal of Electronics & Information Technology, 2005, 27(9): 1463-1466.
Identifiability is one of several security requirements of general proxy signature schemes, i.e. a verifier can determine the identity of the corresponding proxy signer from a proxy signature. In special application, the original signer wants to conceal the identity of the corresponding proxy signer in the proxy signature. The verifier can not recognize the identity of the proxy signer from the proxy signature. In the case of a later dispute, the verifier can reveal the real identity of the proxy signer with the help of the original signer from the proxy signature. In the paper, a new proxy signature scheme should satisfy this requirement.
Mambo M, Usuda K, Okamoto E. Proxy signature: delegation of the power to sign messages. EICE Trans. Fundamentals, 1996,E79-A:9: 1338- 1353.[2]Lee B, Kim H, Kim K. Strong proxy signature and its applications. International Conference on Information and Communication Security, Proc. of SCIS, Japan, 2001:603 - 608.[3]Lee B, Kim H, Kim K. Secure mobile agent using strong non-designated proxy signature Proc. ACISP, Spring-Verlag,2001, LNCS 1334:474 - 486.[4]Shum K, Wei Victor K. A strong proxy signature scheme with proxy signer privacy protection. http:∥www. computer. org/proceedings/wetice/1748/17480055.pdf, 2002.[5]Kim S.[J].Park S, Won D. Proxy signature, revisited, International Conference on Information and Communication Security, Proc of ICICS 97, Berlin, Springer.1997,:-
WANG Zicheng, MA Yongxing, WANG Yanfeng, SUN Junwei. Design of Locally Active Memristor Coupled Heterogeneous Neurons and Its Application to DNA Encoded Image Encryption[J]. Journal of Electronics & Information Technology, 2023, 45(9): 3359-3369. doi: 10.11999/JEIT221493
WANG Zicheng, MA Yongxing, WANG Yanfeng, SUN Junwei. Design of Locally Active Memristor Coupled Heterogeneous Neurons and Its Application to DNA Encoded Image Encryption[J]. Journal of Electronics & Information Technology, 2023, 45(9): 3359-3369. doi: 10.11999/JEIT221493