Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of Taiyuan Normal University(Natural Science Edition)》 2015-01
Add to Favorite Get Latest Update

Secure and Efficient Certificate-based Aggregate Signature

Huang Rufen;Nong Qiang;College of Computer Science,Minnan Normal University;  
To give the formal definition and security model of certificate-based aggregate signature scheme.The authors also To construct a concrete scheme which is provably secure assuming the computational Diffie-Hellman problem and the discrete logarithm problem are hard.In the form,the certificate in our scheme is implicitly used as part of user's temporary signing key,so the key escrow problem can be solved and the key management and dissemination can be simplified in our scheme.The proposed certificate-based aggregate signature scheme does not require any bilinear pairing operations in aggregation stage,while requires only one bilinear pairing operation in verify stage which is independent of the number of the signers.Compared with the other existing secure aggregate signature schemes,our scheme enjoys shorter signature length and less running time.
【Fund】: 国家自然科学基金资助项目(61170246 61373140)
【CateGory Index】: TN918.91
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 1 Hits
1 Yang Tao1,2,3, Kong Lingbo4, Hu Jianbin1,2,3, and Chen Zhong1,2,3 1(Key Laboratory of High Confidence Software Technologies (Peking University), Ministry of Education, Beijing 100871) 2(Key Laboratory of Computer Networks and Information Security (Peking University), Ministry of Education, Beijing 100871) 3(Institute of Software, School of Electronics Engineering and Computer Science, Peking University, Beijing 100871) 4(School of Software Engineering, Beijing Jiaotong University, Beijing 100044);Survey on Aggregate Signature and Its Applications[J];Journal of Computer Research and Development;2012-S2
Chinese Journal Full-text Database 10 Hits
1 QI Yanfeng1,JIA Dajiang2,TANG Chunming1,XU Maozhi1,3,1.School of Mathematical Sciences,Peking University,Beijing 100871;2.Shanxi Electronic Power Corporation,National Grid Corporation,Taiyuan 030001;3.Key Laboratory of Network and Software Security Assurance,Beijing 100871;Optimal Multiplication Algorithm for the η_T Pairing over F_3~(6m)[J];Acta Scientiarum Naturalium Universitatis Pekinensis;2010-05
2 GU Ke1,ZHANG Li-zhuo2,JIANG Chun-lin1,2(1.School of Information Science and Engineering,Central South University,Changsha 410083,China; 2.Department of Computer Science,City University of Hong Kong,Hong Kong,China);Efficient and Secure Electronic Coupon Scheme[J];Journal of Beijing University of Technology;2012-05
3 WU Qing1,ZHANG Le-you2(1.School of Automation,Xi'an Institute of Posts and Telecommunications,Xi'an 710121,China;2.Department of Mathematics,Xidian University,Xi'an 710071,China);New Strongly Unforgeable Identity-Based Signature Scheme in the Standard Model[J];Journal of Beijing University of Posts and Telecommunications;2011-03
4 YUAN Yan (College of Science,Hubei University of technology,Wuhan,Hubei 430000,China);New Short Group Signature Scheme without Random Oracles[J];Computer Security;2011-02
5 Chen Lan-xiang(School of Mathematics and Computer Science,Fujian Normal University,Fuzhou 350108,China)(Key Lab of Network Security and Cryptology,Fuzhou 350108,China);A Homomorphic Hashing Based Provable Data Possession[J];Journal of Electronics & Information Technology;2011-09
6 LI Wei1,XIN Xiang-jun1,ZHANG Hong-wei2(1.Department of Information and Computing Science,Zhengzhou University of Light Industry,Zhengzhou 450002,China;2.Department of Mathematics,Henan University of Technology,Zhengzhou 450002,China);A New ID-based Signature Scheme without Trusted PKG[J];Journal of Guangxi Normal University(Natural Science Edition);2007-02
7 WANG Lin(College of Information Science and Engineering,Guilin University of Technology,Guilin 541004,China);Online/Offline Digital Signature Algorithm in Wireless Networks[J];Journal of Guilin University of Technology;2013-02
8 YIN Aihan;WANG Shengkai;School of Information Engineering,East China Jiaotong University;;Improved Pairing-free Authenticated Key Agreement Protocol Based on ECC[J];Video Engineering;2013-19
9 ZHOUEn-guang;LI Zhou-jun;GUO Hua;JIA Yang-li;State Key Laboratory of Software Development Environment,Beihang University;Key Laboratory of Beijing Network Technology,Beihang University;State Key Laboratory of Information Security,Institute of Information Engineering,Chinese Academy of Sciences;School of Computer,Liaocheng University;;An Improved Data Integrity Verification Scheme in Cloud Storage System[J];Acta Electronica Sinica;2014-01
10 Zhao Guang-qiang;Ling Jie;School of Computers,Guangdong University of Technology;;Anonymous Authentication Protocol Based on Bilinear Pairing and Nonce in Cloud Computing[J];Journal of Guangdong University of Technology;2014-03
【Secondary Citations】
Chinese Journal Full-text Database 2 Hits
1 WANG Zhu1, WU Qian2, YE Ding-feng1, CHEN Hui-yan1,3(1.State Key Laboratory of Information Security,Graduate School of Chinese Academy of Sciences, Beijing 100049, China;2.Information Engineering College, The Central University for Nationalities, Beijing 100081, China;3.Beijing Electronic Science and Technology Institute, Beijing 100070, China );Practical Identity-Based Aggregate Signature from Bilinear Maps[J];上海交通大学学报(英文版);2008-06
2 ZHANG Peng,YU Jian-ping,LIU Hong-wei(Shenzhen University ATR Key Laboratory of National Technology,Shenzhen 518060,China);Data fusion protocol with source security for sensor networks[J];Journal on Communications;2010-11
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved