Citation: | YUAN Ding, FAN Pingzhi. Nonrepudiable Threshold Proxy Signature Scheme Based on Elliptic Curve Cryptography[J]. Journal of Southwest Jiaotong University, 2007, 20(1): 8-12. |
MAMBO M,USUDA K,OKAMOTO E.Proxy signatures:delegation of the power to sign messages[J].IEICE Transactions on Fundamentals of Electronic Communication and Computer Science,1996,E79-A(9):1 338-1 354.[2] MAMBO M,USUDA K,OKAMOTO E.Proxy signatures for delegating signing operation[C]//Proc.of the 3rd ACM Conference on Computer and Communications Security.New York:ACM,1996:48-57.[3] 李继国,李建中,曹珍富,等.具有已知代理人的不可否认门限代理签密方案[J].软件学报,2003,14(12):2 021-2 027.LI Jiguo,LI Jianzhong,CAO Zhenfu,et al.A nonrepudiable threshold proxy signcryption scheme with known proxy agent[J].Journal of Software,2003,14(12):2 021-2 027.[4] KIM S,PARK S,WON D.Proxy signatures,revisited[C]// ICICS'97,Lecture Notes in Computer Science.Berlin:Springer,1997,1 334:223-232.[5] ZHANG Kan.Threshold proxy signature schemes[C]//1997 Information Security Workshop.Ishikawa:Springer,1997:191-197.[6] SUN H M,LEE N Y,HWANG T.Threshold proxy signatures[J].IEE Proceeding-Computers and Digital Techniques,1999,146(5):259-263.[7] HSU C L,WU T S,WU T C.Improvement of threshold proxy signature scheme[J].Appl.Math.Comput.2003,136:315-321.[8] DENNING D.Cryptography and data security[M].Boston:Addison-Wesley,Reading,MA,1983.[9] E(l)GAMAL T.A public-key cryptosystem and a signature scheme based on discrete logarithms[J].IEEE Transactions on Information Theory.1985,IT-31(4):469-472.[10] 王衍波.椭圆曲线上密码研究现状与展望[J].解放军理工大学学报,2002,3(6):18-25.WANG Yanbo.View of the cryptology on elliptic curves[J].Journal of PLA University of Science and Technology,2002,3(6):18-25.[11] MEHTA M,HARN L.Efficient one-time proxy signatures[J].IEE Proc.Commun.,2005,152(2):129-133.[12] 范恒英,何大可,卿铭.公钥密码新方向:椭圆曲线密码学[J].通信技术,2002,127(7):82-84.FAN Hengying,HE Dake,QING Ming.New direction of public key cryptography:elliptic curve cryptography[J].Communications Technology,2002,127(7):82-84.[13] TRAPPE W,WASHINGTON L C.Introduction to cryptography with coding theory[M].New Jersey:Prentice Hall,2002.[14] 秦志光.密码算法的现状和发展研究[J].计算机应用,2004,24(2):1-4.QIN Zhiguang.Cryptography algorithm survey and trends[J].Computer Applications,2004,24(2):1-4.
|
[1] | WANG Wei, PENG Qiyuan, WANG Qi, XIAO Xinbiao. Effect Analysis of Coupler Force onHeavy-Haul Train Safety Under Eccentric Loads[J]. Journal of Southwest Jiaotong University, 2021, 56(2): 378-384. doi: 10.3969/j.issn.0258-2724.20200053 |
[2] | TANG Xinghua, WANG Mingnian, TONG Jianjun, DONG Congyu, ZHANG Chong. Study on Stress Field and Security of Primary Support in High Rock Temperature Tunnel[J]. Journal of Southwest Jiaotong University, 2019, 54(1): 32-38. doi: 10.3969/j.issn.0258-2724.20150958 |
[3] | LIN Yongjun, QIU Xiujiao, GE Yudong. Fuzzy Comprehensive Evaluation Method for Masonry Structure Safety[J]. Journal of Southwest Jiaotong University, 2016, 29(6): 1214-1221. doi: 10.3969/j.issn.0258-2724.2016.06.023 |
[4] | LIU Li, WANG Yongqing. Security Analysis of Video Hashing[J]. Journal of Southwest Jiaotong University, 2012, 25(4): 675-679. doi: 10.3969/j.issn.0258-2724.2012.04.022 |
[5] | CHE Mao-Ru, ZHANG Wei-Hua, JIN Hua-Song, Shu-Min-Hao, . Influences ofW heelsetM isalignment on Running Safety ofRailway Vehicles[J]. Journal of Southwest Jiaotong University, 2010, 23(1): 12-16. doi: 10. 3969/.j issn. 0258-2724. 2 |
[6] | PAN Yi, 2, YANG Cheng, ZHAO Shichun, 2 LIN Yongjun, DAI Jie. Safety Appraisement of Existing Structures Based on Pushover Method[J]. Journal of Southwest Jiaotong University, 2010, 23(2): 174-178. doi: 10. 3969/ j. issn. 0258-2724. |
[7] | YANG Guang-Wu, XIAO Shou-Ne, MA Wei-Hua. Effect of Coupler Compression Force on Locomotive Safety on Tangent Track[J]. Journal of Southwest Jiaotong University, 2010, 23(5): 657-662. doi: 10. 3969/ j. issn. 0258-2724. |
[8] | TAO Hongcai, HE Dake. Taxonomy of Replay Attacks on Security Protocols Based on Attack Hierarchy[J]. Journal of Southwest Jiaotong University, 2007, 20(3): 335-339. |
[9] | LIU Li, PENG Daiyuan, LI Xiaoju. Adaptive Video Watermarking Scheme for Effective Resistance to Linear Collusion in Spatial Domain[J]. Journal of Southwest Jiaotong University, 2007, 20(4): 456-460. |
[10] | ZHANG Xueyuan, WU Guangning, DENG Mingli, GAO Bo. Scheme for Naturally Passing Neutral Sections of High Speed Railways[J]. Journal of Southwest Jiaotong University, 2007, 20(6): 680-684,690. |
[11] | ZHANG Zutao, ZHANG Jiashu, HE Hongjie. Safety of Facial Images Based on Fragile Digital Watermarking[J]. Journal of Southwest Jiaotong University, 2007, 20(3): 340-344. |
[12] | ZHANG Wenfang, HE Dake, WANG Hongxia, WANG Xiaomin. Conspiracy Attack Immune(t,n) Threshold Signature Scheme with Traceability[J]. Journal of Southwest Jiaotong University, 2007, 20(4): 461-467. |
[13] | LU Rongbo, SU Hangli, HE Dake, MIAO Xianghua. Offline E-cash System with Finite Circulation Period Based on Elliptic Curve[J]. Journal of Southwest Jiaotong University, 2006, 19(3): 314-318. |
[14] | WANG Da-yong, MEIZhi-hong, JINWei-dong. Security Scheme forM obile Agent inM aliciousHosts[J]. Journal of Southwest Jiaotong University, 2005, 18(4): 505-509. |
[15] | MEIQi-xiang, HEDa-ke, ZHENG Yu. New Threshold Cryptosystem againstChosen C iphertextAttacks Based on Pairing[J]. Journal of Southwest Jiaotong University, 2005, 18(6): 727-730. |
[16] | DAI Yun, FANPing-zhi. New Approaches for Improving Detection Efficiency of Intrusion Detection Systems[J]. Journal of Southwest Jiaotong University, 2002, 15(6): 673-676. |
[17] | NI Wen-bo, WANGKai-wen. A Criterion for EvaluatingTiltingTrains Return Safety[J]. Journal of Southwest Jiaotong University, 2001, 14(1): 67-70. |
[18] | ZHAO Qiang. Optimal Model and Algorithm for Feasibility of Station Arrival-Departure Requirement of Train Operation Plan[J]. Journal of Southwest Jiaotong University, 2000, 13(2): 196-200. |