期刊文献+

Stateless Transitive Signature Schemes 被引量:1

Stateless Transitive Signature Schemes
原文传递
导出
摘要 A new practical method is introduced to transform the stateful transitive signature scheme to stateless one with-out the loss of security.According to the approach,two concrete stateless transitive signature schemes based on Factoringand RSA are presented respectively.Under the assumption of the hardness of factoring and one-more-RSA-inversion prob-lem,both two schemes are secure under the adaptive chosen-message attacks in random oracle model. A new practical method is introduced to transform the stateful transitive signature scheme to stateless one with-out the loss of security.According to the approach,two concrete stateless transitive signature schemes based on Factoringand RSA are presented respectively.Under the assumption of the hardness of factoring and one-more-RSA-inversion prob-lem,both two schemes are secure under the adaptive chosen-message attacks in random oracle model.
出处 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2004年第4期43-47,共5页 中国邮电高校学报(英文版)
基金 ThisworkisprojectsupportedbyNSFC(No.60372094).
关键词 stateless signature transitive signature scheme one-more-RSA-inversion random oracle model stateless signature transitive signature scheme one-more-RSA-inversion random oracle model
  • 相关文献

参考文献16

  • 1[1]MICALI S, RIVEST R. Transitive signature schemes [A]. Topic in Cryptology-CT-RSA'02 [ C ]. Berlin ( Germany): Springer-Verlag, 2002. 236- 243. 被引量:1
  • 2[2]RIVEST R. Two signature schemes [EB/OL]. Cambridge University. http://theroy. lcs. mit. edu/~rivest/publications. html, October 17, 2000. 被引量:1
  • 3[3]BELLARE M, NEVEN G. Transitive signatures based on factoring and RSA [ A ]. Advances in Cryptology,ASIACRYPT'02 [C]. Berlin(Germany): Springer-Verlag,2002. 397- 414. 被引量:1
  • 4[4]ZHU H, FENG B, Deng R. A transitive signature scheme provably secure against adaptive chosen-message attack [ EB/OL]. Cryptology ePrint Archive. http://eprint. iacr. org/2003/059/. 被引量:1
  • 5[5]ZHU H, FENG G. A transitive signature schemes provably secure against adaptive chosen-message attack [ A ].Advances in Cryptology-CHINACRYPT'2004 [ C]. Beijing (China): Science Press, 2004. 195 - 203. 被引量:1
  • 6[6]JOHNSON R, MOLNAR D, SONG D, et al. Homomorphic signature schemes [ A ]. Topic in Cryptology-CTRSA'02 [ C ]. Berlin (Germany): Springer-Verlag, 2002.244 - 262. 被引量:1
  • 7[7]STEINFELD R, BULL L, ZHENG Y. Content extraction signatures [ A ]. Information Security and CryptologyICISC'01 [C]. Berlin(Germany): Springer-Vedag, 2002.285 - 304 被引量:1
  • 8[8]BELLARE M, GOLDREICH O, GOLDWASSER S. Incremental cryptography: the case of hashing and signing [A]. Advances in Cryptology-CRYPTO'94 [ C ]. Berlin (Germany): Springer-Verlag, 1994. 216 - 233. 被引量:1
  • 9[9]BELLARE M, GOLDREICH O, GOLDWASSER S. Incremental cryptography with application to virus protection [A]. Proceedings of The Twenty-Seventh Annual ACM Symposium on Theory of Computing [ C ]. New York:ACM Press, 1995. 45- 56. 被引量:1
  • 10[10]CHAIR S, RABIN T, RIVEST R. An efficient signature scheme for route aggregation [ EB/OL]. http://theroy.les. mit. edu/~ rivest/publications. html, 2002. 被引量:1

同被引文献7

  • 1[1]NYBERG K,RUEPPEL R A.Message recovery for signature schemes based on the discrete logarithm problem[C]// DE SANTIS A.Advances in Cryptology-EUROCRYPT'94,Lecture Notes in Computer Science(LNCS 950),Berlin:Springer-Verlag,1995:182-193. 被引量:1
  • 2[2]LEE W B,CHANG C C,YANG W P.Authenticated encryption schemes without using it one way function[J].Electron letter.1995,31(19):1 656-1 658. 被引量:1
  • 3[4]MYERS M,ANKNEY R,MALPANI A,et al.FRC2560,X.509 Internet Public Key Infrastructure Online Certificate Status Protocol-OCSP[EB/OL].[2006-10-11].bttp://www.ietf.org/rfc/rfc2560.txt. 被引量:1
  • 4[5]GIRAULT M.Self-certified public keys[C]//Proc.of Advances in Cryptology-EUROCRYPT'91,Lecture Notes in Computer Science 547,Berlin:Springer-Verlag,1991:491-497. 被引量:1
  • 5[6]SHANG Y,WU T C,HUANG S C.ElGamal-like digital signature and multisignature schemes using selfcertified public keys[J].Journal of Systems and software,2000,50(2):99-105. 被引量:1
  • 6[7]TSENG Y M,JAN J K,CHIEN H Y.Digital signature with message recovery using self-certified public keys and its variants[J].Applied Mathematics and Computation,2003,136(2/3):203-214. 被引量:1
  • 7[8]BONEH D,LYNN B,SHACHAM H.Short signatures from the weil pairing[C]//Proc.of Advance Incryptology-Asiacrypt'01,AISACRYPT 2001,LNCS 2248,Berlin:Springer-Verlag,c2001:514-532. 被引量:1

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部