UM
Residential Collegefalse
Status已發表Published
A group proxy signature scheme based on key matrix
Gu K.2; Jia W.-J.2; Jiang C.-L.2
2011-07-01
Source PublicationSichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition)
ISSN10093087
Volume43Issue:4Pages:108-115
AbstractIn order to overcome the problems that the existing group proxy signature schemes do not have strong unforgeability and can not resist collusion attack by proxy themselves, a group proxy signature scheme of resisting collusion attack based on key matrix was proposed. Based on CDH problem and bilinear pairings, the traditional secret sharing scheme was improved by using rank of matrix, and its correctness, security and efficiency were analyzed. The scheme enhances intrusion-tolerance of system, has strong unforgeability and non-repudiation, and can resist collusion attack. It is a forward-secure group proxy signature scheme.
KeywordBilinear transformation CDHP Key matrix Proxy signature
URLView the original
Language英語English
Fulltext Access
Document TypeJournal article
CollectionUniversity of Macau
Affiliation1.City University of Hong Kong
2.Central South University China
Recommended Citation
GB/T 7714
Gu K.,Jia W.-J.,Jiang C.-L.. A group proxy signature scheme based on key matrix[J]. Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2011, 43(4), 108-115.
APA Gu K.., Jia W.-J.., & Jiang C.-L. (2011). A group proxy signature scheme based on key matrix. Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 43(4), 108-115.
MLA Gu K.,et al."A group proxy signature scheme based on key matrix".Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition) 43.4(2011):108-115.
Files in This Item:
There are no files associated with this item.
Related Services
Recommend this item
Bookmark
Usage statistics
Export to Endnote
Google Scholar
Similar articles in Google Scholar
[Gu K.]'s Articles
[Jia W.-J.]'s Articles
[Jiang C.-L.]'s Articles
Baidu academic
Similar articles in Baidu academic
[Gu K.]'s Articles
[Jia W.-J.]'s Articles
[Jiang C.-L.]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Gu K.]'s Articles
[Jia W.-J.]'s Articles
[Jiang C.-L.]'s Articles
Terms of Use
No data!
Social Bookmark/Share
All comments (0)
No comment.
 

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.