UM
Residential Collegefalse
Status已發表Published
A group proxy signature scheme based on sub-secret evolution
Gu K.2; Jia W.2; Jiang C.2
2012-05-01
Source PublicationJisuanji Yanjiu yu Fazhan/Computer Research and Development
ISSN10001239
Volume49Issue:5Pages:962-973
AbstractFew sharing methods of delegating information are used in current group proxy signature schemes. A new secure group proxy signature scheme based on sub-secret evolution is proposed in this paper, which is based on CDHP and bilinear pairings. In this scheme, double sub-secret of delegating information is constructed by secret sharing method and cellular automata theory so that sharing secrets can be evolved with the number of proxy signatures. And the correctness, the security and the efficiency of the scheme are analyzed. The scheme is more efficient without trust center, and is proved to have the existential group proxy signature unforgeability under the provable security model of group proxy signature and to be able to can trace proxies abusing proxy signature. Compared with other group proxy signature schemes, this scheme is more secure.
KeywordCDHP Cellular automata Provable security Proxy signature Sub-secret evolution
URLView the original
Language英語English
Fulltext Access
Document TypeJournal article
CollectionUniversity of Macau
Affiliation1.City University of Hong Kong
2.Central South University China
Recommended Citation
GB/T 7714
Gu K.,Jia W.,Jiang C.. A group proxy signature scheme based on sub-secret evolution[J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2012, 49(5), 962-973.
APA Gu K.., Jia W.., & Jiang C. (2012). A group proxy signature scheme based on sub-secret evolution. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 49(5), 962-973.
MLA Gu K.,et al."A group proxy signature scheme based on sub-secret evolution".Jisuanji Yanjiu yu Fazhan/Computer Research and Development 49.5(2012):962-973.
Files in This Item:
There are no files associated with this item.
Related Services
Recommend this item
Bookmark
Usage statistics
Export to Endnote
Google Scholar
Similar articles in Google Scholar
[Gu K.]'s Articles
[Jia W.]'s Articles
[Jiang C.]'s Articles
Baidu academic
Similar articles in Baidu academic
[Gu K.]'s Articles
[Jia W.]'s Articles
[Jiang C.]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Gu K.]'s Articles
[Jia W.]'s Articles
[Jiang C.]'s Articles
Terms of Use
No data!
Social Bookmark/Share
All comments (0)
No comment.
 

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.