Details of Research Outputs

TitleA group proxy signature scheme based on sub-secret evolution
Creator
Date Issued2012
Source PublicationJisuanji Yanjiu yu Fazhan/Computer Research and Development
ISSN1000-1239
Volume49Issue:5Pages:962-973
AbstractFew sharing methods of delegating information are used in current group proxy signature schemes. A new secure group proxy signature scheme based on sub-secret evolution is proposed in this paper, which is based on CDHP and bilinear pairings. In this scheme, double sub-secret of delegating information is constructed by secret sharing method and cellular automata theory so that sharing secrets can be evolved with the number of proxy signatures. And the correctness, the security and the efficiency of the scheme are analyzed. The scheme is more efficient without trust center, and is proved to have the existential group proxy signature unforgeability under the provable security model of group proxy signature and to be able to can trace proxies abusing proxy signature. Compared with other group proxy signature schemes, this scheme is more secure.
KeywordCDHP Cellular automata Provable security Proxy signature Sub-secret evolution
URLView source
Language英语English
Scopus ID2-s2.0-84862658399
Citation statistics
Document TypeJournal article
Identifierhttp://repository.uic.edu.cn/handle/39GCC9TT/9386
CollectionResearch outside affiliated institution
Corresponding AuthorGu,Ke
Affiliation
1.School of Information Science and Engineering,Central South University,Changsha 410083,China
2.Department of Computer Science,City University of Hong Kong,Hong Kong,Hong Kong
Recommended Citation
GB/T 7714
Gu,Ke,Jia,Weijia,Jiang,Chunlin. A group proxy signature scheme based on sub-secret evolution[J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2012, 49(5): 962-973.
APA Gu,Ke, Jia,Weijia, & Jiang,Chunlin. (2012). A group proxy signature scheme based on sub-secret evolution. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 49(5), 962-973.
MLA Gu,Ke,et al."A group proxy signature scheme based on sub-secret evolution". Jisuanji Yanjiu yu Fazhan/Computer Research and Development 49.5(2012): 962-973.
Files in This Item:
There are no files associated with this item.
Related Services
Usage statistics
Google Scholar
Similar articles in Google Scholar
[Gu,Ke]'s Articles
[Jia,Weijia]'s Articles
[Jiang,Chunlin]'s Articles
Baidu academic
Similar articles in Baidu academic
[Gu,Ke]'s Articles
[Jia,Weijia]'s Articles
[Jiang,Chunlin]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Gu,Ke]'s Articles
[Jia,Weijia]'s Articles
[Jiang,Chunlin]'s Articles
Terms of Use
No data!
Social Bookmark/Share
All comments (0)
No comment.
 

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.