Zhang et al., 2003 - Google Patents
New proxy signature, proxy blind signature and proxy ring signature schemes from bilinear pairingZhang et al., 2003
View PDF- Document ID
- 2870842638181227825
- Author
- Zhang F
- Safavi-Naini R
- Lin C
- Publication year
- Publication venue
- Cryptology ePrint Archive
External Links
Snippet
Proxy signatures are very useful tools when one needs to delegate his/her signing capability to other party. After Mambo $ et\al. $'s first scheme was announced, many proxy signature schemes and various types of proxy signature schemes have been proposed. Due to the …
- 241000626572 Xanthomonas oryzae pv. oryzicola 0 description 7
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
- H04L9/3073—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/3013—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the discrete logarithm problem, e.g. ElGamal or Diffie-Hellman systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3249—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3252—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L27/00—Modulated-carrier systems
- H04L27/18—Phase-modulated carrier systems, i.e. using phase-shift keying includes continuous phase systems
- H04L27/20—Modulator circuits; Transmitter circuits
- H04L27/2032—Modulator circuits; Transmitter circuits for discrete phase modulation, e.g. in which the phase of the carrier is modulated in a nominally instantaneous manner
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3265—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate chains, trees or paths; Hierarchical trust model
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Zhang et al. | New proxy signature, proxy blind signature and proxy ring signature schemes from bilinear pairing | |
| Li et al. | Certificateless signature and proxy signature schemes from bilinear pairings | |
| Zhang et al. | Efficient ID-based blind signature and proxy signature from bilinear pairings | |
| Zhang et al. | Efficient verifiably encrypted signature and partially blind signature from bilinear pairings | |
| Boneh et al. | Chosen ciphertext secure public key threshold encryption without random oracles | |
| Chen et al. | New id-based group signature from pairings | |
| Awasthi et al. | ID-based ring signature and proxy ring signature schemes from bilinear pairings | |
| Cheng et al. | Identity-based aggregate and verifiably encrypted signatures from bilinear pairing | |
| Kancharla et al. | Identity based strong designated verifier signature scheme | |
| Gupta et al. | On securing bi-and tri-partite session key agreement protocol using IBE framework | |
| Rastegari et al. | Efficient certificateless signcryption in the standard model: Revisiting Luo and Wan’s scheme from wireless personal communications (2018) | |
| Chen et al. | New ID-based threshold signature scheme from bilinear pairings | |
| Chow et al. | Escrowed linkability of ring signatures and its applications | |
| Baek et al. | Universal designated verifier signature proof (or how to efficiently prove knowledge of a signature) | |
| Xu et al. | A ring signature scheme using bilinear pairings | |
| Nalla | ID-based tripartite key agreement with signatures | |
| Zhou et al. | Certificate-based generalized ring signcryption scheme | |
| Chen | An interpretation of identity-based cryptography | |
| Lal et al. | Identity based strong bi-designated verifier proxy signature schemes | |
| Singh et al. | Towards a hybrid Public Key Infrastructure (PKI): a review | |
| Lang et al. | A new efficient ID-based proxy blind signature scheme | |
| Zhang et al. | Some new proxy signature schemes from pairings | |
| Bao et al. | Identity-based threshold proxy signature scheme with known signers | |
| Selvi et al. | Security analysis of aggregate signature and batch verification signature schemes | |
| Cheng et al. | An Identity-based Mediated Signature Scheme from Bilinear Pairing. |