Skip to main content

previous disabled Page of 3
and
  1. No Access

    Chapter and Conference Paper

    A Threshold Proxy Signature Scheme Using Self-Certified Public Keys

    So far, all of proposed threshold proxy signature schemes are based on public key systems with certificates and most of them use Shamir’s threshold secret share scheme. Self-certified public key system has att...

    Qingshui Xue, Zhenfu Cao in Parallel and Distributed Processing and Applications (2005)

  2. No Access

    Chapter and Conference Paper

    Constructing Secure Warrant-Based Proxy Signcryption Schemes

    Proxy signcryption, proposed by Gamage et al. [1], is a cryptographic primitive, which combines the functionality of a proxy signature scheme with that of an encryption. But to date, no formal definitions of s...

    Yuan Zhou, Zhenfu Cao, Rongxing Lu in Cryptology and Network Security (2005)

  3. No Access

    Chapter and Conference Paper

    An Efficient Proxy-Protected Signature Scheme Based on Factoring

    Proxy signature is an active cryptographic research area, and a wide range of literature can be found nowadays suggesting improvement and generalization of existing protocols in various direction. However, mos...

    Yuan Zhou, Zhenfu Cao, Zhenchuan Chai in Parallel and Distributed Processing and Ap… (2005)

  4. No Access

    Chapter and Conference Paper

    Constructing Secure Proxy Cryptosystem

    Proxy cryptosystem was first proposed by Mambo and Okamoto, for the delegation of the power to decrypt ciphertexts. However, to our knowledge, there is no reasonable mode aimed at this cryptographic notion. In...

    Yuan Zhou, Zhenfu Cao, Zhenchuan Chai in Information Security and Cryptology (2005)

  5. No Access

    Chapter and Conference Paper

    Encryption Based on Reversible Second-Order Cellular Automata

    In this paper, we present a novel cryptosystem based on reversible second-order cellular automata. The cryptosystem is featured by its large key space and high speed due to cellular automata’s parallel informa...

    Zhenchuan Chai, Zhenfu Cao, Yuan Zhou in Parallel and Distributed Processing and Ap… (2005)

  6. No Access

    Chapter and Conference Paper

    On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme

    Signcryption denotes a cryptographic method, which can process encryption and digital signature simultaneously. So, adopting such schemes, computational cost of encryption and signature compared to traditional...

    Haiyong Bao, Zhenfu Cao, Haifeng Qian in Cryptology and Network Security (2005)

  7. No Access

    Chapter and Conference Paper

    A Generalized Proxy Signature Scheme Based on the RSA Cryptosystem

    In proxy signature schemes, original signers delegate proxy signers to sign messages on behalf of original signers. Based on the RSA cryptosystem, a generalized proxy signature scheme is proposed. The proposed...

    Qingshui Xue, Zhenfu Cao, Haifeng Qian in Parallel and Distributed Computing: Applic… (2005)

  8. No Access

    Chapter and Conference Paper

    Two Proxy Signcryption Schemes from Bilinear Pairings

    Proxy signcryption is a cryptographic primitive which combines the functionalities of a proxy signature scheme and a signcryption scheme. In this paper, based on bilinear pairings, we would like to propose two...

    Qin Wang, Zhenfu Cao in Cryptology and Network Security (2005)

  9. No Access

    Chapter and Conference Paper

    A Novel ID-Based Partial Delegation with Warrant Proxy Signature Scheme

    A novel ID-based proxy-protected signature scheme based on identity information is presented in this paper. We review the concept ID-Based signature introduced by Shamir, define the security notion of an ID-Ba...

    Haifeng Qian, Zhenfu Cao in Parallel and Distributed Processing and Ap… (2005)

  10. No Access

    Chapter and Conference Paper

    Security of an Efficient ID-Based Authenticated Key Agreement Protocol from Pairings

    Authenticated key agreement protocols are essential for secure communications in open and distributed environments. In 2004, Ryu et al. proposed an efficient two-party identity-based authenticated key agreemen...

    Shengbao Wang, Zhenfu Cao, Haiyong Bao in Parallel and Distributed Processing and Ap… (2005)

  11. No Access

    Chapter and Conference Paper

    Efficient Password-Based Authentication and Key Exchange Scheme Preserving User Privacy

    With the flourish of applications over the wired /wireless networks, how to keep user’s privacy has drawn growing concerns in recent years. Although the issue of user anonymity has been addressed in digital si...

    Zhenchuan Chai, Zhenfu Cao, Rongxing Lu in Wireless Algorithms, Systems, and Applications (2006)

  12. No Access

    Chapter and Conference Paper

    Security Model of Proxy-Multi Signature Schemes

    In a proxy multi-signature scheme, a designated proxy signer can generate the signature on behalf of a group of original signers. Although some work has been done in proxy-multi signature schemes, until now th...

    Feng Cao, Zhenfu Cao in Cryptology and Network Security (2006)

  13. No Access

    Chapter and Conference Paper

    Identity Based Key Insulated Signature

    Exposure of secret keys can be the most devastating attack on a signature scheme since such that security is entirely lost. In a certificated based environment, the certification revocation list (CRL) can be u...

    Yuan Zhou, Zhenfu Cao, Zhenchuan Chai in Information Security Practice and Experience (2006)

  14. No Access

    Chapter and Conference Paper

    Remote Authentication with Forward Security

    Password authentication has been accepted as an easy-to-use solution in network environment to protect unauthorized access to a remote server. Although many schemes have been proposed, none of them can achieve...

    Zhenchuan Chai, Zhenfu Cao, Rongxing Lu in Autonomic and Trusted Computing (2006)

  15. No Access

    Chapter and Conference Paper

    Efficient and Provably Secure Multi-receiver Identity-Based Signcryption

    In this paper, we propose an efficient multi-receiver identity based signcryption scheme which only needs one pairing computation to signcrypt a message for n receivers and can provide confidentiality and authent...

    Shanshan Duan, Zhenfu Cao in Information Security and Privacy (2006)

  16. No Access

    Chapter and Conference Paper

    Efficient ID-Based One-Time Proxy Signature and Its Application in E-Cheque

    To put restrictions on signing capability of the proxy signer, the notion of one-time proxy signature was put forth by Kim et al. in 2001. Today, to our best knowledge, although plenty of one-time proxy signat...

    Rongxing Lu, Zhenfu Cao, **aolei Dong in Cryptology and Network Security (2006)

  17. No Access

    Chapter and Conference Paper

    A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power

    We present a proxy cryptosystem based on a certificate-based encryption scheme. The proposed scheme inherits the merits of certificate-based encryption systems: no-key-escrow and implicit certification. In add...

    Lihua Wang, Jun Shao, Zhenfu Cao, Masahiro Mambo in Progress in Cryptology – INDOCRYPT 2007 (2007)

  18. Chapter and Conference Paper

    Efficient Password-Based Authenticated Key Exchange Without Public Information

    Since the first password-based authenticated key exchange (PAKE) was proposed, it has enjoyed a considerable amount of interest from the cryptographic research community. To our best knowledge, most of propose...

    Jun Shao, Zhenfu Cao, Licheng Wang, Rongxing Lu in Computer Security – ESORICS 2007 (2007)

  19. No Access

    Chapter and Conference Paper

    Proxy Re-signature Schemes Without Random Oracles

    To construct a suitable and secure proxy re-signature scheme is not an easy job, up to now, there exist only three schemes, one is proposed by Blaze et al. [6] at EUROCRYPT 1998, and the others are proposed by At...

    Jun Shao, Zhenfu Cao, Licheng Wang in Progress in Cryptology – INDOCRYPT 2007 (2007)

  20. Chapter and Conference Paper

    Short Group Signature Without Random Oracles

    We construct a short group signature which is proven secure without random oracles. By making certain reasonable assumptions and applying the technique of non-interactive proof system, we prove that our scheme...

    **aohui Liang, Zhenfu Cao, Jun Shao, Huang Lin in Information and Communications Security (2007)

previous disabled Page of 3