期刊文献+
共找到1,276篇文章
< 1 2 64 >
每页显示 20 50 100
Digital Signature Based on ISRSAC 被引量:10
1
作者 Teng Yang Yanshuo Zhang +1 位作者 Song Xiao Yimin Zhao 《China Communications》 SCIE CSCD 2021年第1期161-168,共8页
Digital signature has recently played an increasingly important role in cyberspace security.Most of them are based on the public key cryptography.Public key cryptography is a mainstream cryptographic algorithm system ... Digital signature has recently played an increasingly important role in cyberspace security.Most of them are based on the public key cryptography.Public key cryptography is a mainstream cryptographic algorithm system that has been widely used in cyberspace security in recent years.The most classic public key cryptography algorithm is RSA and its difficulty is based on the large integer decomposition problem.In 2017,ISRSAC was proposed by M.Thangaval.ISRSAC has made security improvements to the RSA algorithm by increasing the complexity in factoring the value of modulus‘n’.A digital signature algorithm based on ISRSAC algorithm was completed in this paper,and furthermore,a proxy signature algorithm based on ISRSAC and two kinds of multi-signature algorithms were presented,which include sequential multi-signature and broadcasting multi-signature. 展开更多
关键词 ISRSAC digital signature proxy signature sequential multi-signature broadcasting multisignature
在线阅读 下载PDF
IMPROVEMENT OF NONREPUDIABLE THRESHOLD MULTI-PROXY THRESHOLD MULTI-SIGNATURE SCHEME WITH SHARED VERIFICATION 被引量:2
2
作者 Xie Qi Wang Jilin Yu Xiuyuan 《Journal of Electronics(China)》 2007年第6期806-811,共6页
In 2005, Bao, et al. [Appl. Math. and Comput., vol.169, No.2, 2005] showed that Tzeng, et al.’s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification was insecure, and proposed an improv... In 2005, Bao, et al. [Appl. Math. and Comput., vol.169, No.2, 2005] showed that Tzeng, et al.’s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification was insecure, and proposed an improved scheme with no Share Distribution Center (SDC). This paper shows that Bao, et al.’s scheme suffers from the proxy relationship inversion attack and forgery attack, and pro- poses an improvement of Bao, et al.’s scheme. 展开更多
关键词 Digital signature Proxy signature Threshold proxy signature Threshold multi-proxy threshold multi-signature Threshold verification
在线阅读 下载PDF
A Trusted Distributed Oracle Scheme Based on Share Recovery Threshold Signature 被引量:1
3
作者 Shihao Wang Xuehui Du +4 位作者 Xiangyu Wu Qiantao Yang Wenjuan Wang Yu Cao Aodi Liu 《Computers, Materials & Continua》 2025年第2期3355-3379,共25页
With the increasing popularity of blockchain applications, the security of data sources on the blockchain is gradually receiving attention. Providing reliable data for the blockchain safely and efficiently has become ... With the increasing popularity of blockchain applications, the security of data sources on the blockchain is gradually receiving attention. Providing reliable data for the blockchain safely and efficiently has become a research hotspot, and the security of the oracle responsible for providing reliable data has attracted much attention. The most widely used centralized oracles in blockchain, such as Provable and Town Crier, all rely on a single oracle to obtain data, which suffers from a single point of failure and limits the large-scale development of blockchain. To this end, the distributed oracle scheme is put forward, but the existing distributed oracle schemes such as Chainlink and Augur generally have low execution efficiency and high communication overhead, which leads to their poor applicability. To solve the above problems, this paper proposes a trusted distributed oracle scheme based on a share recovery threshold signature. First, a data verification method of distributed oracles is designed based on threshold signature. By aggregating the signatures of oracles, data from different data sources can be mutually verified, leading to a more efficient data verification and aggregation process. Then, a credibility-based cluster head election algorithm is designed, which reduces the communication overhead by clarifying the function distribution and building a hierarchical structure. Considering the good performance of the BLS threshold signature in large-scale applications, this paper combines it with distributed oracle technology and proposes a BLS threshold signature algorithm that supports share recovery in distributed oracles. The share recovery mechanism enables the proposed scheme to solve the key loss issue, and the setting of the threshold value enables the proposed scheme to complete signature aggregation with only a threshold number of oracles, making the scheme more robust. Finally, experimental results indicate that, by using the threshold signature technology and the cluster head election algorithm, our scheme effectively improves the execution efficiency of oracles and solves the problem of a single point of failure, leading to higher scalability and robustness. 展开更多
关键词 Blockchain threshold signature distributed oracle data submission share recovery
在线阅读 下载PDF
Adaptor signature based on randomized EdDSA in blockchain 被引量:1
4
作者 Yixing Zhu Huilin Li +1 位作者 Mengze Li Yong Yu 《Digital Communications and Networks》 2025年第3期689-699,共11页
Adaptor signature,a new primitive that alleviates the scalability issue of blockchain to some extent,has been widely adopted in the off-chain payment channel and atomic swap.As an extension of standard digital signatu... Adaptor signature,a new primitive that alleviates the scalability issue of blockchain to some extent,has been widely adopted in the off-chain payment channel and atomic swap.As an extension of standard digital signature,adaptor signature can bind the release of a complete digital signature with the exchange of a secret value.Existing constructions of adaptor signatures are mainly based on Schnorr or ECDSA signature algorithms,which suffer low signing efficiency and long signature length.In this paper,to address these issues,we propose a new construction of adaptor signature using randomized EdDSA,which has Schnorr-like structure with higher signing efficiency and shorter signature length.We prove the required security properties,including unforgeability,witness extractability and pre-signature adaptability,of the new adaptor signature scheme in the random oracle model.We conduct a comparative analysis with an ECDSA-based adaptor signature scheme to demonstrate the effectiveness and feasibility of our new proposal. 展开更多
关键词 Blockchain Adaptor signature Randomized EdDSA Payment channel
在线阅读 下载PDF
Molecular subtypes and prognostic signature rooted in disulfidptosis highlight tumor microenvironment in lung adenocarcinoma
5
作者 Wei Xia Jiwei Liu +6 位作者 Ruo Chen Junjie Feng Lei Wu Yize Wang Xiaokun Wang Chenghu Song Wenjun Mao 《Chinese Journal of Cancer Research》 2025年第5期796-820,共25页
Objective:A highly aggressive and lethal malignancy,characterized by its heterogeneity,lung adenocarcinoma(LUAD)presents significant challenges in prognosis and treatment.Disulfidptosis,a newly identified form of regu... Objective:A highly aggressive and lethal malignancy,characterized by its heterogeneity,lung adenocarcinoma(LUAD)presents significant challenges in prognosis and treatment.Disulfidptosis,a newly identified form of regulated cell death,offers novel insights into cancer progression,yet its role in LUAD remains poorly understood.Methods:We identified disulfidptosis-related genes(DRGs)from prior studies and analyzed their interactions and functional enrichment.Molecular subtypes were identified through consensus clustering based on DRG expression,and a prognostic DRG signature was developed using multivariate Cox regression analysis.A nomogram integrating clinical variables was developed to predict survival.Comprehensive analyses,including single-cell RNA sequencing,immune infiltration,and drug sensitivity,were validated using clinical specimens,LUAD cell lines,Western blotting(WB)and immunohistochemistry(IHC).Results:A total of 16 DRGs were identified,classifying LUAD patients into three distinct subtypes with differential survival and immune profiles.A 4-gene signature(GYS1,NDUFA11,NDUFB10,SLC7A11)was used to build a risk score model,demonstrating robust prognostic accuracy.A nomogram combining this signature with clinical features reliably predicted 1-,3-,and 5-year survival.The signature correlated with immune cell infiltration,with single-cell analysis revealing DRG enrichment in myeloid cells.Notably,SLC7A11 and GYS1 were positively associated with chemotherapeutic drug sensitivity.Validation through reverse transcription quantitative polymerase chain reaction(RT-qPCR),WB and IHC confirmed upregulated DRG expression in LUAD tissues and cell lines.Conclusions:This research highlights the essential role of DRGs in modulating the tumor microenvironment,influencing therapeutic response,and determining the prognosis of LUAD.The risk model and nomogram,derived from DRG expression,offer robust tools for survival prediction and personalized treatment stratification,facilitating the development of disulfidptosis-targeted therapeutic strategies. 展开更多
关键词 Disulfidptosis lung adenocarcinoma prognostic signature tumor microenvironment NOMOGRAM
暂未订购
An Efficient Anti-Quantum Blind Signature with Forward Security for Blockchain-Enabled Internet of Medical Things
6
作者 Gang Xu Xinyu Fan +4 位作者 Xiu-Bo Chen Xin Liu Zongpeng Li Yanhui Mao Kejia Zhang 《Computers, Materials & Continua》 2025年第2期2293-2309,共17页
Blockchain-enabled Internet of Medical Things (BIoMT) has attracted significant attention from academia and healthcare organizations. However, the large amount of medical data involved in BIoMT has also raised concern... Blockchain-enabled Internet of Medical Things (BIoMT) has attracted significant attention from academia and healthcare organizations. However, the large amount of medical data involved in BIoMT has also raised concerns about data security and personal privacy protection. To alleviate these concerns, blind signature technology has emerged as an effective method to solve blindness and unforgeability. Unfortunately, most existing blind signature schemes suffer from the security risk of key leakage. In addition, traditional blind signature schemes are also vulnerable to quantum computing attacks. Therefore, it remains a crucial and ongoing challenge to explore the construction of key-secure, quantum-resistant blind signatures. In this paper, we introduce lattice-based forward-secure blind signature (LFSBS), a lattice-based forward-secure blind signature scheme for medical privacy preservation in BIoMT. LFSBS achieves forward security by constructing a key evolution mechanism using a binary tree structure. This mechanism ensures that even if future encryption keys are leaked, past data can still remain secure. Meanwhile, LFSBS realizes post-quantum security based on the hardness assumption of small integer solution (SIS), making it resistant to potential quantum computing attacks. In addition, we formally define and prove the security of LFSBS in a random oracle model, including blindness and forward-secure unforgeability. Comprehensive performance evaluation shows that LFSBS performs well in terms of computational overhead, with a reduction of 22%–73% compared to previous schemes. 展开更多
关键词 Internet of Things blockchain forward-secure blind signature
在线阅读 下载PDF
Impact of the chaotic semiconductor laser output power on time-delay-signature of chaos and random bit generation
7
作者 Chenpeng Xue Xu Wang +3 位作者 Likai Zheng Haoyu Zhang Yanhua Hong Zuxing Zhang 《Chinese Physics B》 2025年第3期325-330,共6页
We experimentally analyze the effect of the optical power on the time delay signature identification and the random bit generation in chaotic semiconductor laser with optical feedback.Due to the inevitable noise durin... We experimentally analyze the effect of the optical power on the time delay signature identification and the random bit generation in chaotic semiconductor laser with optical feedback.Due to the inevitable noise during the photoelectric detection and analog-digital conversion,the varying of output optical power would change the signal to noise ratio,then impact time delay signature identification and the random bit generation.Our results show that,when the optical power is less than-14 dBm,with the decreasing of the optical power,the actual identified time delay signature degrades and the entropy of the chaotic signal increases.Moreover,the extracted random bit sequence with lower optical power is more easily pass through the randomness testing. 展开更多
关键词 CHAOS time delay signature entropy estimation random bit generation
原文传递
Hydrothermal signatures in sediments along the South Mid Atlantic Ridge from 18°S to 22°S:implications for potential hydrothermal fields
8
作者 Peng YANG Chuanshun LI +5 位作者 Jihua LIU Baoju YANG Jun YE Bing LI Yuan DANG Dewen DU 《Journal of Oceanology and Limnology》 2025年第3期746-763,共18页
The hydrothermal signatures of mid-ocean ridge sediments are crucial geochemical data providing insights into investigating hydrothermal anomalies and locating seafloor massive sulfide deposits.This paper outlines the... The hydrothermal signatures of mid-ocean ridge sediments are crucial geochemical data providing insights into investigating hydrothermal anomalies and locating seafloor massive sulfide deposits.This paper outlines the geochemical features of 24 surface sediments and one sediment core(26 V-GC 01,294 cm)along the South Mid-Atlantic Ridge(SMAR)from 18°S to 22°S,an area where hydrothermal active fields have yet to be discovered.The surface sediments mainly consist of biogenic carbonates,aluminosilicates,and hydrothermal Fe-Mn(oxy)oxides.The core sediments primarily comprise organic matter,detrital materials,hydrothermal components,and substances scavenged from seawater.The rare Earth element(REE)patterns suggest the presence of hydrothermal contributions within the surface and core sediments.The enrichment factors for Fe,Mn,Cu,and Zn in surface sediments suggest these metals are concentrated at the 19°S,21°S,and 21.5°S segments,further indicating their potential as hydrothermal active fields.Downcore variations of Fe,Mn,P,Cu,Pb,V,and Co suggest at least six episodes of hydrothermal activity.The impact of hydrothermal processes on the sediments from SMAR 18°S to 22°S indicates that the study area has the potential to host a significant number of hydrothermal active fields. 展开更多
关键词 South Mid-Atlantic Ridge hydrothermal signature sediment geochemistry 18°S-22°S hydrothermal activity
在线阅读 下载PDF
Smart Contract-Aided Attribute-Based Signature Algorithm with Non-Monotonic Access Structures
9
作者 Xin Xu Zhen Yang Yongfeng Huang 《Computers, Materials & Continua》 2025年第6期5019-5035,共17页
Attribute-Based Signature(ABS)is a powerful cryptographic primitive that enables fine-grained access control in distributed systems.However,its high computational cost makes it unsuitable for resource-constrained envi... Attribute-Based Signature(ABS)is a powerful cryptographic primitive that enables fine-grained access control in distributed systems.However,its high computational cost makes it unsuitable for resource-constrained environments,and traditional monotonic access structures are inadequate for handling increasingly complex access policies.In this paper,we propose a novel smart contract-assisted ABS(SC-ABS)algorithm that supports nonmonotonic access structures,aiming to reduce client computing overhead while providingmore expressive and flexible access control.The SC-ABS scheme extends the monotonic access structure by introducing the concept of negative attributes,allowing for more complex and dynamic access policies.By utilizing smart contracts,the algorithmsupports distributed trusted assisted computation,and the computation code is transparent and auditable.Importantly,this design allows information about user attributes to be deployed on smart contracts for computation,both reducing the risk of privacy abuse by semi-honest servers and preventing malicious users from attribute concealment to forge signatures.We prove that SC-ABS satisfies unforgeability and anonymity under a random oracle model,and test the scheme’s cost.Comparedwith existing schemes,this scheme has higher efficiency in client signature and authentication.This scheme reduces the computing burden of users,and the design of smart contracts improves the security of aided computing further,solves the problem of attribute concealment,and expresses a more flexible access structure.The solution enables permission control applications in resource-constrained distributed scenarios,such as the Internet of Things(IoT)and distributed version control systems,where data security and flexible access control are critical. 展开更多
关键词 Attribute-based signature non-monotone smart contract
在线阅读 下载PDF
华晖音响璀璨呈现:YG Acoustics XV 3 Signature音箱震撼HIGH END臻品展
10
《视听前线》 2025年第8期81-81,共1页
2025年7月5日下午,广州HIGH END臻品展现场,华晖音响携手国际顶级音响品牌YG Acoustics,成功举办了-场别开生面的XV 3 Signature音箱演示会,为现场的音响发烧友及音乐爱好者带来了一场前所未有的听觉盛宴。
关键词 XV 3 signature 华晖音响 YG Acoustics
在线阅读 下载PDF
Side-channel free quantum digital signature with source monitoring
11
作者 Luo-Jia Ma Ming-Shuo Sun +4 位作者 Chun-Hui Zhang Hua-Jian Ding Xing-Yu Zhou Jian Li Qin Wang 《Chinese Physics B》 2025年第1期53-58,共6页
Quantum digital signature(QDS)can guarantee the information-theoretical security of a signature with the fundamental laws of quantum physics.However,most current QDS protocols do not take source security into account,... Quantum digital signature(QDS)can guarantee the information-theoretical security of a signature with the fundamental laws of quantum physics.However,most current QDS protocols do not take source security into account,leading to an overestimation of the signature rate.In this paper,we propose to utilize Hong–Ou–Mandel interference to characterize the upper bound of the source imperfections,and further to quantify information leakage from potential side-channels.Additionally,we combine decoy-state methods and finite-size analysis in analyzing the signature rate.Simulation results demonstrate the performance and feasibility of our approach.Our current work can improve the practical security of QDS systems,thereby promoting their further networked applications. 展开更多
关键词 Hong-Ou-Mandel interference side-channel free quantum digital signature
原文传递
A novel Wnt/β-catenin signaling gene signature for progression and metastasis of gastric cancer
12
作者 JIA CHEN FEI JIANG +3 位作者 KAIYI NIU HAODONG ZHAO LI LI HONGZHU YU 《Oncology Research》 2025年第5期1199-1215,共17页
Backgrounds:As cancer progresses through various stages of malignancy,metastasis,and drug resistance,the Wnt/-catenin signaling is frequently dysregulated.Despite advancements in medical technology and therapeutic str... Backgrounds:As cancer progresses through various stages of malignancy,metastasis,and drug resistance,the Wnt/-catenin signaling is frequently dysregulated.Despite advancements in medical technology and therapeutic strategies,the prognosis for numerous gastric cancer patients remains unfavorable.Methods:For the analysis of prognostic signature genes associated with Wnt signaling in GC,we used LASSO(least absolute shrinkage and selection operator)regression.To explore the function,cell specificity,and transcriptional regulation of the signature gene Carboxypeptidase Z(CPZ),we conducted co-expression analysis,single-cell RNA sequencing data analysis,transcription factor prediction,and dual luciferase reporter assay.The knockdown and overexpression experiments were also performed to observe the changes in the downstream gene expression,as well as the influence on the biological functions of GC cells.Results:We identified a five-gene signature,including CPZ,Collagen Triple Helix Repeat Containing-1(CTHRC1),Dickkopf-1(DKK1),Epidermal Growth Factor(EGF),and Glypican Proteoglycan-3(GPC3),with risk scores predictive of the prognosis of GC patients.We found that the adipocyte enhancer binding protein 1(AEBP1)and transcription factor 3(TCF3)could interact in the nucleus and synergistically enhance the expression of Wnt signaling-associated genes,including WNT2/FZD2(Wnt family member 2/frizzled class receptor 2)and VIM(vimentin),thus promoting the invasion,migration,and malignant metastasis of GC.Conclusions:Our study offers a precise gene-signature prediction method for the prognosis of GC.We discovered the synergistic effect of AEBP1 and TCF3 in the nucleus on GC metastasis.GC may benefit from the identification of this potential therapeutic target. 展开更多
关键词 Gastric Cancer(GC) signature genes Prognosis Carboxypeptidase Z(CPZ) Adipocyte Enhancer Binding Protein 1(AEBP1)
暂未订购
Genomic signatures of local adaptation to precipitation and solar radiation in kiwifruit
13
作者 Quan Jiang Yufang Shen +2 位作者 Lianhai Wu Zhengwang Jiang Xiaohong Yao 《Plant Diversity》 2025年第5期733-745,共13页
Local adaptation is critical for plant survivals and reproductions in the context of global environmental change.Heterogeneous environments impose various selection pressures that influence the fitness of organisms an... Local adaptation is critical for plant survivals and reproductions in the context of global environmental change.Heterogeneous environments impose various selection pressures that influence the fitness of organisms and leave genomic signatures during the process of adaptation to local environments.However,unveiling the genomic signatures of adaptation still poses a major challenge especially for perennials due to limited genomic resources.Here,we utilized Actinidia eriantha,a Chinese endemic liana,as a model case to detect drivers of local adaptation and adaptive signals through landscape genomics for 311 individuals collected from 25 populations.Our results demonstrated precipitation and solar radiation were two crucial factors influencing the patterns of genetic variations and driving adaptive processes.We further uncovered a set of genes involved in adaptation to heterogeneous environments.Among them,AeERF110 showed high genetic differentiation between populations and was confirmed to be involved in local adaptation via changes in allele frequency along with precipitation(Prec_03)and solar radiation(Srad_03)in native habitats separately,implying that adaptive loci frequently exhibited environmental and geographic signals.In addition,we assessed genetic offsets of populations under four future climate models and revealed that populations from middle and east clusters faced higher risks in adapting to future environments,which should address more attentions.Taken together,our study opens new perspectives for understanding the genetic underpinnings of local adaptation in plants to environmental changes in a more comprehensive fashion and offered the guides on applications in conservation efforts. 展开更多
关键词 Local adaptation KIWIFRUIT Genotype-environment association study Genomic signatures Conservation application
在线阅读 下载PDF
Whole-genome sequencing reveals genetic architecture and selection signatures of Kazakh cattle
14
作者 Zhannur Niyazbekova Yuan Xu +11 位作者 Min Qiu Hao-Ping Wang Ibragimov Primkul Hojjat Asadollahpour Nanaei Yessengali Ussenbekov Kuanysh Kassen Yi Liu Cai-Yue Gao Shynar Akhmetsadykova Nuriddin Ruzikulov Yu Jiang Yu-Dong Cai 《Zoological Research》 2025年第2期301-311,共11页
Local cattle breeds play a critical role in breeding programs due to their genetic adaptations to diverse environmental conditions.However,the genomic architecture of local cattle breeds in Kazakhstan remains largely ... Local cattle breeds play a critical role in breeding programs due to their genetic adaptations to diverse environmental conditions.However,the genomic architecture of local cattle breeds in Kazakhstan remains largely unexplored.This study utilized whole-genome sequencing data from Kazakh cattle to elucidate their genetic composition,uncovering three primary ancestral components:European,Eurasian,and East Asian taurine.The East Asian taurine lineage likely represents the earliest genetic contribution to Kazakh cattle but was largely replaced by subsequent waves of cattle migrations across Eurasia,leaving only a minor genetic signature in the current cattle population.In contrast,Eurasian taurine ancestry predominated in the Alatau and Kazakh local breeds,while the European taurine component was most prevalent in Kazakh white-headed cattle,consistent with their documented breeding history.Kazakh cattle exhibited higher genetic diversity and lower inbreeding coefficients compared to European commercial breeds,reflecting reduced exposure to intense artificial selection.A strong selection signal was identified on chromosome 6 at a locus encompassing PDGFRA,KIT,and KDR,which may be associated with the white-headed pigmentation characteristic of Kazakh white-headed cattle.Additional genes under selection were linked to lipid metabolism(IRS1,PRKG1,and ADCY8),meat production traits(KCNMA1,PDGFRA,HIF1A,and ANTXR1),and dairy production(ATP2B1,DHX15,FUK,NEGR1,CCDC91,COG4,and PTK2B).This study represents the first comprehensive analysis of nuclear genome data from local Kazakh cattle.It highlights the impact of historical cattle migrations across Eurasia on their genetic landscape and identifies key genomic regions under selection.These findings advance our understanding of the evolutionary history of cattle and offer valuable genetic resources for future breeding strategies. 展开更多
关键词 Kazakh white-headed cattle Alatau cattle Local breed Genetic diversity Whole-genome sequencing Selection signatures
在线阅读 下载PDF
没有什么能阻止它成为一款令人瞩目的播放器评Atoll ST300 Signature
15
作者 Door Geoffrey 剑萍(编译) 《视听前线》 2025年第11期25-29,共5页
来自法国Brecey的Atoll Electronique近年来在荷兰和比利时站稳了脚跟,这在很大程度上要归功于代理商Viertron,他们毫无例外地提供了产品目录中的每一款设备。这次我们收到了两款器材,但我们关注的重点是3000欧元的Atoll ST300 Signatur... 来自法国Brecey的Atoll Electronique近年来在荷兰和比利时站稳了脚跟,这在很大程度上要归功于代理商Viertron,他们毫无例外地提供了产品目录中的每一款设备。这次我们收到了两款器材,但我们关注的重点是3000欧元的Atoll ST300 Signature流媒体播放器。 展开更多
关键词 流媒体播放器 Atoll ST300 signature
在线阅读 下载PDF
CERTIFICATELESS SIGNATURE AND BLIND SIGNATURE 被引量:13
16
作者 Zhang Lei Zhang Futai 《Journal of Electronics(China)》 2008年第5期629-635,共7页
Certificateless public key cryptography is a new paradigm introduced by Al-Riyami and Paterson.It eliminates the need of the certificates in traditional public key cryptosystems and the key escrow problem in IDentity-... Certificateless public key cryptography is a new paradigm introduced by Al-Riyami and Paterson.It eliminates the need of the certificates in traditional public key cryptosystems and the key escrow problem in IDentity-based Public Key Cryptography(ID-PKC).Due to the advantages of the certificateless public key cryptography,a new efficient certificateless pairing-based signature scheme is presented,which has some advantages over previous constructions in computational cost.Based on this new signature scheme,a certificateless blind signature scheme is proposed.The security of our schemes is proven based on the hardness of computational Diffie-Hellman problem. 展开更多
关键词 Certificateless cryptography Digital signature Blind signature Certificateless blind signature Computational Diffie-Hellman (CDH) problem
在线阅读 下载PDF
An Efficient Certificateless Aggregate Signature Scheme 被引量:4
17
作者 KANG Baoyuan WANG Mu JING Dongya 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2017年第2期165-170,共6页
Aggregate signature can aggregate n signatures on n messages from n signers into a single signature that convinces any verifier that n signers sign the n messages, respectively. In this paper, by combining certificate... Aggregate signature can aggregate n signatures on n messages from n signers into a single signature that convinces any verifier that n signers sign the n messages, respectively. In this paper, by combining certificateless public key cryptography and aggregate signatures, we propose an efficient certificateless aggregate signature scheme and prove its security. The new scheme is proved secure against the two representative types adversaries in certificateless aggregate signature under the assumption that computational Diffie-Hellman problem is hard. Furthermore, from the comparison of the computation cost of the new scheme with some existing certificateless aggregate signature schemes in group sum computation, scalar multiplication computation, Hash computation and abilinear pairings computation, it concludes that the new scheme reduces the computation cost in scalar multiplication computation in half and maintains the same in the other computation costs. 展开更多
关键词 digital signature aggregate signature certificateless aggregate signature SECURITY bilinear maps
原文传递
A New ID-Based Proxy Blind Signature Scheme 被引量:3
18
作者 LANGWei-min YANGZong-kai +1 位作者 CHENGWen-qing TANYun-meng 《Wuhan University Journal of Natural Sciences》 CAS 2005年第3期555-558,共4页
An identity-based proxy blind signature scheme from bilinear pairings isintroduced, which combines the advantages of proxy signature and blind signature. Furthermore, ourscheme can prevent the original signer from gen... An identity-based proxy blind signature scheme from bilinear pairings isintroduced, which combines the advantages of proxy signature and blind signature. Furthermore, ourscheme can prevent the original signer from generating the proxy blind signature, thus the profitsof the proxy signer are guaranteed. We introduce bilinear pairings to minimize computationaloverhead and to improve the related performance of our scheme. In addition, the proxy blindsignature presented is non-repudiable and it fulfills perfectly the security requirements of a proxyblind signature. 展开更多
关键词 digital signature proxy signature blind signature identity-basedcryptography bilinear pairings
在线阅读 下载PDF
A new improved ID-based proxy ring signature scheme from bilinear pairings 被引量:2
19
作者 郎为民 杨宗凯 +1 位作者 程文青 谭运猛 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2006年第6期688-691,共4页
Ring signature and proxy signature are of vital importance to secure electronic commerce. Recently, the bilinear pairing such as Well pairing or Tate pairing on elliptic curves and hyperelliptic curves is playing an i... Ring signature and proxy signature are of vital importance to secure electronic commerce. Recently, the bilinear pairing such as Well pairing or Tate pairing on elliptic curves and hyperelliptic curves is playing an important role in security solutions. Several ID-based signature schemes have been put forward, many of which are based on bilinear pairings. In key management and moderate security demand scenarios, ID-based public key cryptosystem is more preferable than other public key infrastructure based systems. In this paper, an improved ID-based proxy ring signature scheme from bilinear pairings is proposed which combines the advantages of proxy signature and of ring signatures. Our scheme can guarantee the profits of the proxy signer via preventing the original signer form generating the proxy ring signature. Furthermore, bilinear pairings are introduced to minimize the computation overhead and to improve the related performance of our scheme. In contrast with Zhang's scheme, our scheme is a computational efficiency improvement for signature verification because the computational cost of bilinear pairings required is reduced from O(n) to O( 1 ). In addition, the proxy ring signature presented in this paper can perfectly satisfy all the security requirements of proxy ring signature, i. e. signer-ambiguity, non-forgeability, verification, non-deniability and distinguishability. 展开更多
关键词 digital signature proxy signature ring signature identity-based cryptography bilinear pairings
在线阅读 下载PDF
Efficient Certificateless Aggregate Signature Scheme 被引量:2
20
作者 Yu-Chi Chen Gwoboa Homg +2 位作者 Chao-Liang Liu Yuan-Yu Tsa Chi-Shiang Chan 《Journal of Electronic Science and Technology》 CAS 2012年第3期209-214,共6页
In ubiquitous computing,data should be able to be accessed from any location,and the correctness of data becomes vital during the communication.Suppose that many users sign different messages respectively,before forwa... In ubiquitous computing,data should be able to be accessed from any location,and the correctness of data becomes vital during the communication.Suppose that many users sign different messages respectively,before forwarding or sending these messages,then the verifier must spend a lot of computing time to verify their signatures.Consequently,the aggregate signature scheme is an effective method of improving efficiency in this kind of systems,which provides the convenience for the verifier.In this paper,we propose a new certificateless aggregate signature scheme which is efficient in generating a signature and verification.This scheme is provably secure under the extended computational Diffie-Hellman assumption. 展开更多
关键词 Aggregate signature certificatelessaggregate signature certificateless cryptography digitalsignature.
在线阅读 下载PDF
上一页 1 2 64 下一页 到第
使用帮助 返回顶部