参考文献
[ 1 ] Hao Shengang, Li Zhang, Muhammad M. A Union
Authentication Protocol of Cross-domain Based on
Bilinear Pairing [J]. Journal of Software,2013,8(5):
1094-1100.
[ 2 ] Zhang Longjun,Zhang Jianhe,Xia Ang,et al. Domain
Authentication Protocol Based on Certificate
Signcryption in Ipv6 Network [ C ] / / Proceedings of
International Conference on Information Engineering and
Applications. London,UK:Springer,2013:213-220.
[ 3 ] Hong Xuan,Long Yu. A Novel Unidirectional Proxy Resignature
Scheme and Its Application for MANETs[J].
Journal of Computers,2012,7(7):1796-1800.
[ 4 ] Ateniese G,Hohenberger S. Proxy Re-signatures: New
Definitions, Algorithms, and Applications [ C ] / /
Proceedings of ACM CCS’05. Alexandria,USA:ACM
Press,2005:310-319.
[ 5 ] Shao J,Cao Z,Wang L,et al. Proxy Re-signature Schemes
Without Random Oracles [ C ]/ / Proceedings of INDOCRYPT’
07. Chennai,India:[s. n. ],2007:197-209.
[ 6 ] Kiate K,Ikkwon Y, Secogan L. Remark on Shao et al
Bidirectional Proxy Re-signature Scheme in Indocrypt ’
07[J]. International Journal of Network Security,2009,
8(3):308-311.
(下转第124 页)
(上接第119 页)
[ 7 ] Benoit L,Damien V. Multi-use Unidirectional Proxy Resignatures
[ C ] / / Proceedings of the 15th ACM
Conference on Computer and Communications Security.
Alexandria,USA:ACM Press,2008:511-520.
[ 8 ] Deng Y, Du M, You Z, et al. A Blind Proxy Resignatures
Scheme Based on Standard Model[J]. Journal
of Electronics & Information Technology,2010,32(5):
1119-1223.
[ 9 ] He Defei. A Novel Blind Proxy Re-signature Scheme[J].
Computer Applications and Software, 2012, 29 ( 3 ):
294-296.
[10] Rawat S S,Shrivastava G K. Improved Id-based Proxy
Re-signcryption Scheme [ C ] / / Proceedings of 2012 IEEE CICN’12. Mathura,India:[s. n. ],2012:730-733.
[11] Buchmann J,Dahmen E,Ereth S,et al. On the Security
of the Winternitz One-time Signature Scheme [ J ].
International Journal of Applied Cryptography, 2013,
3(1):84-96.
[12] 刘振华,胡予濮,张襄松. 标准模型下高效的强不可伪
造签名方案[J]. 江苏大学学报:自然科学版,2013,
34(3):309-313.
[13] 魏春艳,蔡晓秋. 标准模型下的高调无证书短签名方
案[J]. 计算机工程,2012,38(13):119-121.
[14] Vivek S S,Selvi S S D, Rangan C P, et al. Strongly
Unforgeable Proxy Re-signature Schemes in the Standard
Model [ EB / OL ]. (2012-10-10). http:/ / eprint. iacr.
org / 2012/ 080. pdf.
[15] Matsuda T,Attrapadung N,Hanaoka G,et al. A CDHbased
Strongly Unforgeable Signature Without Collision
Resistant Hash Function[C]/ / Proceedings of ProvSec’07.
Wollongong,Australia:[s. n. ]:2007:68-84.
[16] Waters B. Efficient Identity-based Encryption Without
Random Oracles [C] / / Proceedings of EuroCrypt’ 05.
Aarhus,Danish:[s. n. ],2005:114-127.
编辑 索书志 |