Computer Engineering & Science
Previous Articles Next Articles
WEI Liang1,2,HUANG Zhen-jie1,CHEN Qun-shan2
Received:
2019-10-21
Revised:
2020-01-04
Online:
2020-06-25
Published:
2020-06-25
WEI Liang1,2,HUANG Zhen-jie1,CHEN Qun-shan2. Decentralized attribute-based undeniable signature[J]. Computer Engineering & Science.
[1] | Feng Deng-guo, Chen Cheng. Research on attribute-based cryptography[J].Journal of Cryptologic Research,2014,1(1):1-12.(in Chinese) |
[2] | Maji H,Prabhakaran M,Rosulek M,et al.Attribute-based signatures:Achieving attribute-privacy and collusion-resistance[J/OL].IACR Cryptology ePrint Archive, |
20 | 08.[2008-04-12].http://eprint.iacr.org/2008/328. |
[3] | Sahai A, Waters B.Fuzzy identity-based encryption[C]∥Proc of the 24th Annual International Conference on Theory and Application of Cryptographic Techniques,2005:457-473. |
[4] | Okamoto T, Takashima K.Efficient attribute-based signatures for non-monotone predicates in the standard model[J].IEEE Transactions on Cloud Computing,2014,2(4):409-421. |
[5] | Sakai Y,Attrapadung N,Hanaoka G.Attribute-based signatures for circuits from bilinear map[C]∥Proc of the 19th IACR International Conference on Public Key Cryptography,2016:283-300. |
[6] | Datta P,Okamoto T,Takashima K.Efficient attribute-based signatures for unbounded arithmetic branching programs [C]∥Proc of |
IACR International Workshop on Public-Key Cryptography,2019:127-158. | |
[7] | Ren Y,Jiang T.Verifiable outsourced attribute-based signature scheme [J].Multimedia Tools and Applications,2018,77(14):18105-18115. |
[8] | El Kaafarani A,Chen L,Ghadafifi E. Attribute-based signatures with user-controlled linkability without random oracles[C]∥Proc of the 16th International Conference on Crypto- graphy and Coding,2017:161-184. |
[9] | Gardham D,Manulis M.Hierarchical attri- bute-based signatures:Short keys and optimal signature length[C]∥Proc of |
International Conference on Applied Cryptography and Network Security,2019:89-109. | |
[10] | Zhang Yan-hua,Hu Yu-pu,Chen Jiang-shan. Hidden attri- bute-based signatures without anonymity revocation from lattices[J].Chinese Journal of Computers,2018,41(2):481-492.(in Chinese) |
[11] | Shi Yan,Pan Wei,Chen Wei-chang,et al.Attribute-based proxy-signcryption scheme[J].Communications Technology,2010,43(9):147-149.(in Chinese) |
[12] | Fu Xiao-jing, Zhang Guo-yin, Ma Chun-guang.Dynamic threshold attributes-based signature scheme[J].Computer Science,2013,40(7):93-97.(in Chinese) |
[13] | Cao Dan, Zhao Bao-kang, Wang Xiao-feng, et al.Multi- authority attribute-based signature[C]∥ |
Proc of 2011 3rd International Conference on Intelligent Networking and Colloborative Systems,2011:668-672. | |
[14] | Okamoto T, Takashima K.Decentralized attribute-based signatures[C] |
∥Proc of International Workshop on Public Key Cryptography,2013:125-142. | |
[15] | Kaafarani A E,Ghadafi E,Khader D.Decentralized traceable attribute-based signatures[C]∥Proc of the 9th Internatio- nal Symposium on |
Cryptographers’ Track at the RSA Conference,2014:327-348. | |
[16] | Ghadafi E.Stronger security notions for decentralized traceable attribute-based signatures and more efficient constructions[C]∥Proc of Cryptographers’ Track at the RSA Conference,2015:391-409. |
[17] | Sun J,Qin J,Ma J.Securely outsourcing decentralized multi-authority attribute based signature [C]∥Proc of |
the 9th International Symposium on Cyberspace Safety and Security,2017:86-102. | |
[18] | Sun Y,Zhang R,Wang X,et al.A decentralizing attribute-based signature for healthcare blockchain[C]∥Proc of the 27th International Conference on Computer Communication and Networks (ICCCN),2018:1-9. |
[19] | Chaum D, van Antwerpen H.Undeniable signatures[C]∥Proc of |
the 9th Annual International Cryptology Confe- rence,1989:212-216. | |
[20] | Libert B,Quisquater J.Identity based undeniable signatures[C]∥Proc of Cryptographers’ Track at the RSA Confe- rence,2004:112-125. |
[21] | Duan S.Certificateless undeniable signature scheme[J].Information Sciences,2008,178(3):742-755. |
[22] | Ding Sheng-long. Research on attribute based undeniable signature protocol[D].Shanghai:Fudan University,2013.(in Chinese) |
[23] | Zhao Yi-ming,Ding Sheng-long.Attribute based undeniable signature protocol[C]∥Proc of Chinese Information Security,2013:212-220.(in Chinese) |
[24] | Li Qi, Zhu Hong-bo,Xiong Jin-bo,et al.Multi-authority attribute-based access control system in mHealth with trace- ability[J].Journal on Communications,2018,39(6):1-10.(in Chinese) |
[25] | Cramer R, Damgard I,Schoenmakers B.Proofs of partial knowledge and simplified design of witness hiding protocols[C]∥Proc of |
Annual International Cryptology Conference,1994:174-187. | |
[26] | Schnorr C P.Efficient signature generation by smart cards[J].Journal of Cryptology,1991,4(3):161-174. |
[27] | Shamir A.How to share a secret[J].Communications of the ACM,1979,22(11):612-613. |
[28] | Fiat A,Shamir A.How to prove yourself:Practical solutions to identification and signature problems[C]∥Proc of |
Conference on the Theory and Application of Cryptographic Techniques,1986:186-194. | |
[29] | Kurosawa K, Heng S H.3-move undeniable signature scheme[C]∥Proc of |
the 24th Annual International Confe- rence on the Theory and Applications of Cryptographic,2005:181-197. | |
[30] | Anada H, Arita S, Sakurai K.Attribute-based signatures without pairings via the Fiat-Shamir paradigm[C]∥Proc of the 2nd ACM Workshop on ASIA Public-Key Cryptography,2014:49-58. |
[31] | Hong H,Sun Z.Efficient key insulated attribute based signature without bilinear pairings for mobile communications[J].Automatic Control and Computer Sciences,2017,51(3):159-166. |
[32] | Herranz J.Attribute-based signatures from RSA[J].Theoretical Computer Science,2014,527(3):73-82. |
附中文参考文献: | |
[1] | 冯登国,陈成.属性密码学研究[J].密码学报,2014,1(1):1-12. |
[10] | 张彦华,胡予濮,陈江山.格上无匿名性撤销的隐藏的属性签名[J].计算机学报,2018,41(2):481-492. |
[11] | 史妍,潘伟,陈伟昌,等.基于属性的代理签密方案[J].通信技术,2010,43(9):147-149. |
[12] | 付小晶,张国印,马春光.一个改进的动态门限基于属性签名方案[J].计算机科学,2013,40(7):93-97. |
[22] | 丁圣龙.基于属性的不可否认签名协议研究[D].上海:复旦大学,2013. |
[23] | 赵一鸣,丁圣龙.基于属性的不可否认签名协议[C]// 全国信息保密学术会议,2013:212-220. |
[24] | 李琦,朱洪波,熊金波,等.mHealth中可追踪多授权机构基于属性的访问控制方案[J].通信学报,2018,39(6):1-10. |
[1] | HE Qi-zhi, CAO Su-zhen, WANG Cai-fen, LU Yan-fei, FANG Zi-xuan, YAN Jun-jian. An identity-based auditable multiple interception signature scheme [J]. Computer Engineering & Science, 2023, 45(02): 269-276. |
[2] | RUAN Ou, CHEN Ji-chen, MAO Hao. An efficient batch verification algorithm for SM2 signatures [J]. Computer Engineering & Science, 2021, 43(07): 1236-1242. |
[3] |
WANG Rui,CAO Su-zhen,WANG Fei,LANG Xiao-li,DU Xia-ling.
A batch message authentication scheme based on
certificateless key insulation in vehicular ad hoc networks
[J]. Computer Engineering & Science, 2019, 41(09): 1588-1596.
|
[4] |
CAO Suzhen1,DAI Wenjie1,WANG Caifen1,WANG Xiuya1,SUN Han1,ZUO Weiping2.
Analysis and improvement of an ID-based
partially blind signature scheme
[J]. Computer Engineering & Science, 2018, 40(12): 2193-2197.
|
[5] |
ZUO Li-ming1,2,ZHANG Ting-ting1,2,GUO Hong-li1,2,CHEN Zuo-song1,2.
Attack and improvement on an ID-based
partially blind signature scheme
|
[6] | ZHOU Bin1, ZHU Rongbo1, ZHANG Ying2. A bit string contentaware data chunking algorithm [J]. Computer Engineering & Science, 2016, 38(10): 1967-1973. |
[7] | LI Lijuan,GUO Yajie. An improved ElGamal digital signature scheme [J]. J4, 2016, 38(06): 1097-1102. |
[8] | ZHOU Ming,WANG Jian. An efficient and provably secure proxy blind signature scheme [J]. J4, 2015, 37(09): 1643-1651. |
[9] | DENG Lunzhi,WANG Xiangbin,QU Yunyun. High-efficient signcryption scheme based on identity [J]. J4, 2014, 36(03): 441-445. |
[10] |
ZHOU Caixue.
Cryptanalysis and improvement of some certificateless signcryption schemes [J]. J4, 2013, 35(8): 69-76. |
[11] |
XU Dewu.
Improvement and security analysis about signcryption scheme in electronic commerce [J]. J4, 2013, 35(7): 77-81. |
[12] | GAO Bo1,LI Yan2. A serverside software authorization model based on hardware feature and dynamic license [J]. J4, 2013, 35(2): 56-61. |
[13] | YU Bo1,CHEN Jianping1,GU Xiang2. A Practical Electronic Voting System Based on Digital Signature [J]. J4, 2012, 34(5): 40-44. |
[14] | ZHAO Xin,WANG Xiaodong. On the Fast Broadcast Authentication Protocols in Wireless Sensor Networks [J]. J4, 2010, 32(4): 106-109. |
[15] | MING Deting,LI Juan,YANG Jun. Research and Application on the Query Processing Against Encrypted XML Data [J]. J4, 2010, 32(4): 142-145. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
湘公网安备 43010502000083号
湘ICP备10006030号
Copyright © Computer Engineering & Science, All Rights Reserved.
Address:109 Deya Rd,Changsha,hunan(410073) Tel: 0731-87002567 Email: jsjgcykx@vip.163.com
Powered by Beijing Magtech Co., Ltd.