相关期刊:《Journal of Computer Science & Technology》《The Journal of China Universities of Posts and Telecommunications》《Computer Modeling in Engineering & Sciences》《Communications in Theoretical Physics》更多>>
funded by the Special Innovation Project forGeneral Colleges and Universities in Guangdong Province (Grant No.2020KTSCX126).
The mushroom growth of IoT has been accompanied by the generation of massive amounts of data.Subject to the limited storage and computing capabilities ofmost IoT devices,a growing number of institutions and organizati...
supported by National Key Research and Development Program of China (2020YFB1005404);National Natural Science Foundation of China (62172010);Henan Province Higher Education Key Research Project (22A520048)。
The emerging edge computing technology for the Internet of Things has been playing an important role in our daily life. It is promising to utilize a multi-receiver signcryption scheme to protect the transmission data ...
The work was supported by the National Key Technologies R&D Programs of China(2018YFB1402702 and 2017YFB0802500);the“13th”Five-Year National Cryptographic Development Foundation(MMJJ20180208);NSFC-Genertec Joint Fund For Basic Research(U1636104);the National Natural Science Foundation of China(Grant Nos.61572132,61972032 and U1705264).
In this paper we present a designated verifier-set signature(DVSS),in which the signer allows to designate many verifiers rather than one verifier,and each designated verifier can verify the validity of signature by h...
supported by the National Natural Science Foundation of China(No.U1636213,No.61370063);Beijing Municipal Natural Science Foundation(No.4172053);Natural Science Foundation of Henan(No.162300410322)
Proxy signature plays an important role in distributed systems, mobile agent applications, distributed shared object systems, global distribution networks and mobile communications etc., since it allows the original s...
Supported by the National Natural Science Foundation of China under Grant No.61303039;Sichuan Youth Science and Technique Foundation No.2017JQ0048;Fundamental Research Funds for the Central Universities(Nos.2682014CX095);CSC Scholarship;EU ICT COST Crypto Action No.IC1306
Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontriviai scheme has attracted great interests because o~ its...
Sponsored by the National Natural Science Foundation of China(Grant No.61401226,61672270,61602216);the MOE(Ministry of Education in China) Project of Humanities and Social Sciences(Grant No.14YJAZH023,15YJCZH129);the Basic Research Program of Jiangsu University of Technology(Grant No.KYY14007);the Qing Lan Project for Young Researchers of Jiangsu Province of China(Grant No.KYQ14004);the Open Fund of State Key Laboratory of Information Security,Institute of Information Engineering,Chinese Academy of Sciences(Grant No.2015-MSB-10)
In order to protect historical ciphertext when the private key leaked in the broadcasting system,the forward-secure multi-receiver signcryption scheme is designed based on the generic graded multilinear mapping encodi...
supported by the National Natural Science Foundation of China(61303217,61303217,61472309,61502372 and 61572390);the 111 Project(B08038);the Fundamental Research Funds for the Central Universities(JB140115);the Natural Science Foundation of Shaanxi Province(2013JQ8002,2014JQ8313)
Because of its wide application in anonymous authentication and attribute-based messaging, the attribute-based signature scheme has attracted the public attention since it was proposed in 2008. However, most of the ex...
supported by National Science Foundation of China (Grant Nos.61272413,61005049,61133014,61070249,61272415);Fok Ying Tung Education Foundation (Grant No.131066);Program for New Century Excellent Talents in University (Grant No.NCET-12-0680);Research Fund for the Doctoral Program of Higher Education of China (Grant No.20134401110011);Opening Project of Shanghai Key Laboratory of Integrate Administration Technologies for Information Security (Grand No.AGK2011003);R&D Foundation of Shenzhen Basic Research Project (Grant No.JC201105170617A);Guangdong Natural Science Foundation (Grant No.S2011010001206);Foundation for Distinguished Young Talents in Higher Education of Guangdong (Grant No.2012LYM 0027);Fundamental Research Funds for the Central Universities and A*STAR SERC (Grant No.102 101 0027 in Singapore)
Signcryption is functional combination of encryption and signature,efficiency higher than the separate signing and encrypting.Recently,Youn et al.presented a new signcryption scheme,which has fast online signing and s...
supported in part by the National Natural Science Foundation of China(No.61262057,No.61063041,No.61163038);the Young Teachers’Scientific Research Ability Promotion Program of Northwest Normal University(No.NWNU-LKQN-10-22)
To improve the performance of threshold proxy re-signatures, the notion of on-line/off-line threshold proxy re-signatures is introduced. The bulk of re-signature computation can be done in the off-line phase before th...
partially supported by the National High Technology Research and Development 863 Program of China underGrant No.2011AA010803;the National Natural Science Foundation of China under Grant Nos.61100225, 61202450;the funding of Science and Technology on Information Assurance Laboratory (KJ-13-02);the Key Scientific and Technological Project of Henan Province of China under Grant No. 122102210126
Recently, Wang et al. presented a new construction of attribute-based signature with policy-and-endorsement mechanism. The existential unforgeability of their scheme was claimed to be based on the strong Diffie-Hellma...