![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
A new ID-based proxy multi-signature scheme from bilinear pairings
ID-based public key cryptosystem can be a good alternative for certificate-based public key setting. This paper provides an efficient ID-based proxy multi-signature scheme from pairings. In the random oracle m...
-
Article
An identity-based key-exchange protocol
An identity-based key-exchange protocol using a bilinear map is proposed and it is proved SK-secure (session key secure) in the AM (authenticated links adversarial model) provided the BDDH (bilinear Diffie-Hel...
-
Article
Distribution of random session key based on key-insulated public-key cryptosystems
Based on the characteristic of key-insulated public-key cryptosystem, we propose a distributed random session keys distribution protocol without a key distribution center. The session key is generated by diffe...
-
Article
A formal model for the security of proxy signature schemes
This paper provides theoretical foundations for the secure proxy signature primitive. We present a formal model for the security of proxy signature schemes, which defines the capabilities of the adversary and ...
-
Article
A fair off-line e-cash system with group signature
This paper describes the research results and development of fair off-line e-cash systems so far, and points out that in these systems, the bank can compute the double-spender’s account secret key, thus the ba...