Improved group signature scheme based on Chinese remainder theorem

被引:0
|
作者
School of Computer Science and Technology, Beijing University of Aeronautics and Astronautics, Beijing 100191, China [1 ]
机构
来源
Dongnan Daxue Xuebao | 2008年 / SUPPL. 1卷 / 34-38期
关键词
Authentication;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] Improvement And Research of Group Signature Scheme Based on Chinese Remainder Theorem
    Qi, Ai-qin
    Shen, Yong-jun
    Proceedings of the 2016 3rd International Conference on Mechatronics and Information Technology (ICMIT), 2016, 49 : 55 - 58
  • [2] Improvement of threshold RSA signature scheme based on Chinese Remainder Theorem
    Xu, Fu
    Ma, Jing-Jin
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2015, 37 (10): : 2495 - 2500
  • [3] Digital signature scheme for ad hoc based on Chinese remainder theorem
    Li, Hongwei
    Yang, Shoubao
    Huang, Meisun
    Ren, Anxi
    Jisuanji Gongcheng/Computer Engineering, 2006, 32 (02): : 153 - 155
  • [4] Group-oriented signature schemes based on Chinese remainder theorem
    Porkodi, C.
    Arumuganathan, R.
    2009 WORLD CONGRESS ON NATURE & BIOLOGICALLY INSPIRED COMPUTING (NABIC 2009), 2009, : 1660 - 1663
  • [5] The security analysis of forward-secure group blind signature scheme based on the Chinese remainder theorem
    Wei, Gao
    MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 5644 - 5647
  • [6] Security analysis and improvement of a group signature scheme based on Chinese remainder theory
    Li, Xinshe
    Yue, Kaiduan
    Hu, Yupu
    Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University, 2009, 43 (02): : 77 - 80
  • [7] KEY TREE AND CHINESE REMAINDER THEOREM BASED GROUP KEY DISTRUBUTION SCHEME
    Zhou, Jie
    Ou, Yong-Hao
    JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2009, 32 (07) : 967 - 974
  • [8] Key Tree and Chinese Remainder Theorem Based Group Key Distribution Scheme
    Zhou, Jie
    Ou, Yong-hao
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, PROCEEDINGS, 2009, 5574 : 254 - 265
  • [9] An Information Hiding Scheme Based on Chinese Remainder Theorem
    Chen, Jinrui
    Liu, Kesheng
    Yan, Xuehu
    Liu, Hanlin
    Liu, Lintao
    Tan, Longdan
    2018 IEEE 3RD INTERNATIONAL CONFERENCE ON IMAGE, VISION AND COMPUTING (ICIVC), 2018, : 785 - 790
  • [10] A proactive secret sharing scheme based on Chinese remainder theorem
    Meng, Keju
    Miao, Fuyou
    Ning, Yu
    Huang, Wenchao
    Xiong, Yan
    Chang, Chin-Chen
    FRONTIERS OF COMPUTER SCIENCE, 2021, 15 (02)