期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
A Formal Model for the Security of Proxy Signature Schemes 被引量:3
1
作者 GUChun-xiang ZHUYue-fei ZHANGYa-juan 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期275-278,共4页
This paper provides theoretical foundations for the secure proxy signatureprimitive. We pres-enta formal model for the security of proxy signature schemes, which defines thecapabilities of the adversary and the securi... This paper provides theoretical foundations for the secure proxy signatureprimitive. We pres-enta formal model for the security of proxy signature schemes, which defines thecapabilities of the adversary and the security goals to capture which mean for a prox-ysignaturescheme to be secure. Then, we present an example of proxy signature scheme that can be proven securein the standard model. 展开更多
关键词 provable security digital signature proxy signature
在线阅读 下载PDF
An Identity-Based Key-Exchange Protocol
2
作者 ZHANGYa-juan ZHUYue-fei HUANGQiu-sheng 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期235-238,共4页
An identity-based key-exchange protocol using a bilinear map is proposed andit is proved SK-sceure( session key secure) in the AM (authenticated links adversarial model)provided the BDDH (bilinear Diftie-Hellmen) assu... An identity-based key-exchange protocol using a bilinear map is proposed andit is proved SK-sceure( session key secure) in the AM (authenticated links adversarial model)provided the BDDH (bilinear Diftie-Hellmen) assumption is correct. Then we applythe signature-basedauthenticalor to our protocol and obtain an id entity-based key-exchange protocol that is SK-securein the UM (unauthenticated links adversarial model) provided the BDDH assumption is correct. 展开更多
关键词 AM DM KE protocol authenticator BDDH assumption
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部