面向授权的数字签名方案的新型设计

61003232
2010
F0206.信息安全
禹勇
青年科学基金项目
教授
电子科技大学
20万元
数字签名;签名授权;可证明安全;验证授权
2011-01-01到2013-12-31
  • 中英文摘要
  • 结题摘要
  • 结题报告
  • 项目成果
  • 项目参与人
查看更多信息请先登录或注册
查看更多信息请先登录或注册
查看更多信息请先登录或注册
重置
序号 标题 类型 作者
1 Cryptanalysis of an Off-Line Electronic Cash Scheme Based on Proxy Blind Signature 期刊论文 Yu, Yong|Mu, Yi|Wang, Guilin|Sun, Ying|
2 A New Construction of Proxy Signature Using Chameleon Hash Function 会议论文 Yannan Li|Qi Xia|Jianbing Ni|Yong Yu|
3 Cryptanalysis of two searchable public key encryption schemes with a designated tester 期刊论文 Jianbing Ni|Yong Yu|Qi Xia|Lei Niu|
4 Security analysis of a distributed reprogramming protocol for wireless sensor networks 期刊论文 Yong Yu|Jianbing Ni|Ying Sun|
5 基于身份签名方案的安全性分析 期刊论文 禹勇|李继国|伍玮|黄欣沂|
6 A novel construction of SDVS with secure disavowability 期刊论文 Bo Yang|Yong Yu|Ying Sun|
7 Efficient public key encryption with revocable keyword search 期刊论文 Yong Yu|Jianbing Ni|Haomiao Yang|Yi Mu|Willy Susilo|
8 对一种基于身份环签名方案的安全性分析 期刊论文 吴淮|孙颖|许春香|伍玮|
9 A Secure Scalar Product Protocol Against Malicious Adversaries 期刊论文 Bo Yang|Yong Yu|Zhonghuang Yang|
10 Enhanced authentication for commercial video services 期刊论文 Xinyi Huang|Chengkang Chu|Hung Ming Hu|Jianying Zhou|
11 A Provably Secure Construction of Certificate-Based Encryption from Certificateless Encryption 期刊论文 Wei Wu|Yi Mu|Willy Susilo|Xinyi Huang|Li Xu|
12 On indistinguishability in remote data integrity checking 期刊论文 Xinyu Fan|Guomin Yang|Yi Mu|Yong Yu|
13 Further observation on proxy re-encryption with keyword search 期刊论文 Xu An Wang|Xinyi Huang|Xiaoyuan Yang|Longfei Liu|Xuguang Wu|
14 Cryptanalysis of a Fuzzy Identity Based Encryption Scheme in the Standard Model 期刊论文 Wang, Xu An|Yang, Xiaoyuan|Zhang, Minqing|Yu, Yong|
15 On the security of auditing mechanisms for secure cloud storage 期刊论文 Yong Yu|Lei Niu|Guomin Yang|Yi Mu|Willy Susilo|
16 Provably secure proxy signature scheme from factorization 期刊论文 Yu, Yong|Mu, Yi|Susilo, Willy|Sun, Ying|Ji, Yafu|
17 Secure Delegation of Signing Power from Factorization 期刊论文 Yong Yu|Man Ho Au|Yi Mu|Willy Susilo|
18 Further cryptanalysis of a signature scheme with message recovery 会议论文 Lei Niu|Jianbing Ni|Ying Sun|Yong Yu|
19 对一种代理签名方案的攻击和改进 期刊论文 孙颖|许春香|吴淮|陈艾东|
20 Improved certificateless signature scheme provably secure in the standard model 期刊论文 Yong Yu|Yi Mu|Guilin Wang|Qi Xia|
21 Further Analysis of a Practical Hierarchical Identity-Based Encryption Scheme 期刊论文 Sun, Ying|Yu, Yong|Mu, Yi|
22 Certificateless Signatures: New Schemes and Security Models 期刊论文 Xinyi Huang|Yi Mu|Willy Susilo|Duncan S. Wong|Wei Wu|
23 Security pitfalls of an efficient threshold proxy signature scheme for mobile agents 期刊论文 Yong Yu|Yi Mu|Willy Susilo|Man Ho Au|
24 Group key agreement for secure group communication in dynamic peer systems. 期刊论文 Xixiang Lv|Hui Li|baocang Wang|
25 ​安全高效基于身份签名方案的密码学分析 期刊论文 禹勇|倪剑兵|许春香|牛磊|
26 Improvement of a remote data possession checking protocol from algebraic signatures 会议论文 Yong Yu|Jianbing Ni|Jian Ren|Wei Wu|Lanxiang Chen|Qi Xia|
27 Strongly unforgeable proxy signature scheme secure in the standard model 期刊论文 Sun, Ying|Xu, Chunxiang|Yu, Yong|Mu, Yi|
28 An efficient short certificate-based signature scheme 期刊论文 jiguo Li|Xinyi Huang|Yichen Zhang|Lizhong Xu|
29 On the Security of an Identity-Based Proxy Signature Scheme in the Standard Model 期刊论文 Sun, Ying|Yu, Yong|Zhang, Xiaosong|Chai, Jiwen|
30 A Secure and Efficient E-cheque Protocol from Chameleon Hash Function 会议论文 Ying Sun|Jiwen Chai|Huihui Liang|Jianbing Ni|Yong Yu|
查看更多信息请先登录或注册