UNFORGEABILITY

作品数:15被引量:32H指数:4
导出分析报告
相关领域:自动化与计算机技术更多>>
相关期刊:《Communications in Theoretical Physics》《Frontiers of Computer Science》《Wuhan University Journal of Natural Sciences》《Chinese Journal of Electronics》更多>>
相关基金:国家自然科学基金高等学校学科创新引智计划国家重点基础研究发展计划北京市自然科学基金更多>>
-

检索结果分析

结果分析中...
选择条件:
  • 期刊=Chinese Journal of Electronicsx
条 记 录,以下是1-3
视图:
排序:
An Identity-Based Proxy Signature on NTRU Lattice被引量:5
《Chinese Journal of Electronics》2018年第2期297-303,共7页ZHU Hongfei TAN Yu'an YU Xiao XUE Yuan ZHANG Qikun ZHU Liehuang LI Yuanzhang 
supported by the National Natural Science Foundation of China(No.U1636213,No.61370063);Beijing Municipal Natural Science Foundation(No.4172053);Natural Science Foundation of Henan(No.162300410322)
Proxy signature plays an important role in distributed systems, mobile agent applications, distributed shared object systems, global distribution networks and mobile communications etc., since it allows the original s...
关键词:Identity based proxy signature Quantum computers attack NTRU lattice UNFORGEABILITY 
On-line/Off-line Threshold Proxy Re-Signatures被引量:5
《Chinese Journal of Electronics》2014年第2期248-253,共6页YANG Xiaodong WANG Caifen ZHANG Lei QIU Jianbin 
supported in part by the National Natural Science Foundation of China(No.61262057,No.61063041,No.61163038);the Young Teachers’Scientific Research Ability Promotion Program of Northwest Normal University(No.NWNU-LKQN-10-22)
To improve the performance of threshold proxy re-signatures, the notion of on-line/off-line threshold proxy re-signatures is introduced. The bulk of re-signature computation can be done in the off-line phase before th...
关键词:ON-LINE/OFF-LINE Threshold proxy re- signature Chameleon hash function Standard model Ex- istential unforgeability. 
ID-based Signcryption KEM to Multiple Recipients被引量:14
《Chinese Journal of Electronics》2011年第2期317-322,共6页SUN Yinxia LI Hui 
This work is supported by the National Natural Science Foundation of China (No.60772136, No.61003300), 863 Hi-Tech Research and Development Program of China (No.2007AA01Z435), National Key Technology R&D Program of China during the 9th Five-Year Plan Period (No.2008BAH22B03, No.2007BAH08B01), National 111 Program (No.B08038) and Fundamental Research Funds for the Central Universities 'No.JY10000901021).
Identity based signcryption Key encapsulation mechanism (KEM) is used to encapsulate a symmetric key during the construction of hybrid signcryption in the identity based setting. We introduce the notion of Identity ...
关键词:Identity based signcryption KEM Multiple recipients INDISTINGUISHABILITY UNFORGEABILITY Random oracle model Gap bilinear Diffie-Hellman (Gap- BDH) Computational Diflle-Hellman (CDH). 
检索报告 对象比较 聚类工具 使用帮助 返回顶部