Cryptanalysis and improvement of two ring signature schemes provably secure in standard model

被引:0
|
作者
Wang, Hua-Qun [1 ]
Yu, Hong [1 ]
Lv, Xian-Qiang [1 ]
Zhang, Fu-Tai [2 ]
Sun, Yan-Fei [3 ]
机构
[1] School of Information Engineering, Dalian Fisheries University, Dalian 116023, China
[2] College of Mathematics and Computer Science, Nanjing Normal University, Nanjing 210097, China
[3] College of Telecomm. and Information Engineering, Nanjing Univ. of Posts and Telecomm., Nanjing 210003, China
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:57 / 62
相关论文
共 50 条
  • [21] Cryptanalysis and Improvement of a New Certificateless Signature Scheme in the Standard Model
    Wu, Chenhuang
    Huang, Hui
    Zhou, Kun
    Xu, Chunxiang
    CHINA COMMUNICATIONS, 2021, 18 (01) : 151 - 160
  • [22] Cryptanalysis of Two Efficient HIBE Schemes in the Standard Model
    Wang, Xu An
    Yang, Xiaoyuan
    Zhang, Minqing
    FUNDAMENTA INFORMATICAE, 2011, 109 (02) : 189 - 200
  • [23] Cryptanalysis of two group signature schemes
    Joye, M
    Kim, S
    Lee, NY
    INFORMATION SECURITY, PROCEEDINGS, 1999, 1729 : 271 - 275
  • [24] Cryptanalysis on Two Certificateless Signature Schemes
    Zhang, F.
    Li, S.
    Miao, S.
    Mu, Y.
    Susilo, W.
    Huang, X.
    INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2010, 5 (04) : 586 - 591
  • [25] Cryptanalysis and Improvement of A Ring Signature Based on EIGamal Signature
    Wang, Huaqun
    Han, Shengju
    Deng, Changhui
    Zhang, Futai
    2009 WRI WORLD CONGRESS ON SOFTWARE ENGINEERING, VOL 3, PROCEEDINGS, 2009, : 397 - +
  • [26] An efficient and provably secure identity-based signature scheme in the standard model
    Li, Ji-Guo
    Jiang, Ping-Jin
    Jisuanji Xuebao/Chinese Journal of Computers, 2009, 32 (11): : 2130 - 2136
  • [27] A provably secure ring signature scheme in certificateless cryptography
    Zhang, Lei
    Zhang, Futai
    Wu, Wei
    PROVABLE SECURITY, PROCEEDINGS, 2007, 4784 : 103 - +
  • [28] Provably secure multi-proxy signature scheme with revocation in the standard model
    Liu, Zhenhua
    Hu, Yupu
    Zhang, Xiangsong
    Ma, Hua
    COMPUTER COMMUNICATIONS, 2011, 34 (03) : 494 - 501
  • [29] Key substitution attacks on provably secure short signature schemes
    Tan, CH
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2005, E88A (02) : 611 - 612
  • [30] Provably secure threshold signature schemes without random oracles
    State Key Laboratory of Information Security, Graduate University, Chinese Academy of Sciences, Beijing 100039, China
    Jisuanji Xuebao, 2006, 9 (1636-1640):