Skip to main content

previous disabled Page of 5
and
  1. No Access

    Article

    Nonrepudiable proxy multi-signature scheme

    The concept of proxy signature introduced by Mambo, Usuda, and Okamoto allows a designated person, called a proxy signer, to sign on behalf of an original signer. However, most existing proxy signature schemes...

    JiGuo Li, ZhenFu Cao, YiChen Zhang in Journal of Computer Science and Technology (2003)

  2. No Access

    Article

    A new threshold proxy signature scheme from bilinear pairings

    Based on the GDH signature (short signature scheme) a probabilistic signature scheme is proposed in this paper with security proof. Then a new threshold proxy signature from bilinear pairings is proposed as we...

    Haifeng Qian, Zhenfu Cao, Qingshui Xue in Science in China Series F: Information Sciences (2004)

  3. No Access

    Chapter and Conference Paper

    A Threshold Proxy Signature Scheme Using Self-Certified Public Keys

    So far, all of proposed threshold proxy signature schemes are based on public key systems with certificates and most of them use Shamir’s threshold secret share scheme. Self-certified public key system has att...

    Qingshui Xue, Zhenfu Cao in Parallel and Distributed Processing and Applications (2005)

  4. No Access

    Chapter and Conference Paper

    Secure Delegation-by-Warrant ID-Based Proxy Signcryption Scheme

    In this paper, we first construct a security model for delegation-by-warrant ID-based proxy signcryption schemes and formalize notions of security for them. To the best of our knowledge, no related work has be...

    Shanshan Duan, Zhenfu Cao, Yuan Zhou in Computational Intelligence and Security (2005)

  5. No Access

    Chapter and Conference Paper

    Constructing Secure Warrant-Based Proxy Signcryption Schemes

    Proxy signcryption, proposed by Gamage et al. [1], is a cryptographic primitive, which combines the functionality of a proxy signature scheme with that of an encryption. But to date, no formal definitions of s...

    Yuan Zhou, Zhenfu Cao, Rongxing Lu in Cryptology and Network Security (2005)

  6. No Access

    Chapter and Conference Paper

    An Efficient Proxy-Protected Signature Scheme Based on Factoring

    Proxy signature is an active cryptographic research area, and a wide range of literature can be found nowadays suggesting improvement and generalization of existing protocols in various direction. However, mos...

    Yuan Zhou, Zhenfu Cao, Zhenchuan Chai in Parallel and Distributed Processing and Ap… (2005)

  7. No Access

    Chapter and Conference Paper

    Constructing Secure Proxy Cryptosystem

    Proxy cryptosystem was first proposed by Mambo and Okamoto, for the delegation of the power to decrypt ciphertexts. However, to our knowledge, there is no reasonable mode aimed at this cryptographic notion. In...

    Yuan Zhou, Zhenfu Cao, Zhenchuan Chai in Information Security and Cryptology (2005)

  8. No Access

    Chapter and Conference Paper

    Encryption Based on Reversible Second-Order Cellular Automata

    In this paper, we present a novel cryptosystem based on reversible second-order cellular automata. The cryptosystem is featured by its large key space and high speed due to cellular automata’s parallel informa...

    Zhenchuan Chai, Zhenfu Cao, Yuan Zhou in Parallel and Distributed Processing and Ap… (2005)

  9. No Access

    Chapter and Conference Paper

    On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme

    Signcryption denotes a cryptographic method, which can process encryption and digital signature simultaneously. So, adopting such schemes, computational cost of encryption and signature compared to traditional...

    Haiyong Bao, Zhenfu Cao, Haifeng Qian in Cryptology and Network Security (2005)

  10. No Access

    Chapter and Conference Paper

    Certificateless Threshold Signature Schemes

    We analyze the relationship and subtle difference between the notion of certificateless public key cryptography (CL-PKC) and identity-based schemes without a trusted private key generator (PKG), then propose a...

    Licheng Wang, Zhenfu Cao, **angxue Li in Computational Intelligence and Security (2005)

  11. No Access

    Chapter and Conference Paper

    Factoring-Based Proxy Signature Schemes with Forward-Security

    The property of forward-security can be used to reduce the potential damages caused by key exposure. However, none of the existing proxy signature schemes has taken forward-security into consideration. And mos...

    Zhenchuan Chai, Zhenfu Cao in Computational and Information Science (2005)

  12. No Access

    Chapter and Conference Paper

    Efficient ID-Based Proxy Signature and Proxy Signcryption Form Bilinear Pairings

    In this paper, based on bilinear pairings, we would like to construct an identity based proxy signature scheme and an identity based proxy signcryption scheme without secure channel. We also analyze the two pr...

    Qin Wang, Zhenfu Cao in Computational Intelligence and Security (2005)

  13. No Access

    Chapter and Conference Paper

    A Generalized Proxy Signature Scheme Based on the RSA Cryptosystem

    In proxy signature schemes, original signers delegate proxy signers to sign messages on behalf of original signers. Based on the RSA cryptosystem, a generalized proxy signature scheme is proposed. The proposed...

    Qingshui Xue, Zhenfu Cao, Haifeng Qian in Parallel and Distributed Computing: Applic… (2005)

  14. No Access

    Chapter and Conference Paper

    Two Proxy Signcryption Schemes from Bilinear Pairings

    Proxy signcryption is a cryptographic primitive which combines the functionalities of a proxy signature scheme and a signcryption scheme. In this paper, based on bilinear pairings, we would like to propose two...

    Qin Wang, Zhenfu Cao in Cryptology and Network Security (2005)

  15. No Access

    Chapter and Conference Paper

    A Novel ID-Based Partial Delegation with Warrant Proxy Signature Scheme

    A novel ID-based proxy-protected signature scheme based on identity information is presented in this paper. We review the concept ID-Based signature introduced by Shamir, define the security notion of an ID-Ba...

    Haifeng Qian, Zhenfu Cao in Parallel and Distributed Processing and Ap… (2005)

  16. No Access

    Chapter and Conference Paper

    Security of an Efficient ID-Based Authenticated Key Agreement Protocol from Pairings

    Authenticated key agreement protocols are essential for secure communications in open and distributed environments. In 2004, Ryu et al. proposed an efficient two-party identity-based authenticated key agreemen...

    Shengbao Wang, Zhenfu Cao, Haiyong Bao in Parallel and Distributed Processing and Ap… (2005)

  17. No Access

    Chapter and Conference Paper

    Efficient Password-Based Authentication and Key Exchange Scheme Preserving User Privacy

    With the flourish of applications over the wired /wireless networks, how to keep user’s privacy has drawn growing concerns in recent years. Although the issue of user anonymity has been addressed in digital si...

    Zhenchuan Chai, Zhenfu Cao, Rongxing Lu in Wireless Algorithms, Systems, and Applications (2006)

  18. No Access

    Chapter and Conference Paper

    Security Model of Proxy-Multi Signature Schemes

    In a proxy multi-signature scheme, a designated proxy signer can generate the signature on behalf of a group of original signers. Although some work has been done in proxy-multi signature schemes, until now th...

    Feng Cao, Zhenfu Cao in Cryptology and Network Security (2006)

  19. No Access

    Chapter and Conference Paper

    Identity Based Key Insulated Signature

    Exposure of secret keys can be the most devastating attack on a signature scheme since such that security is entirely lost. In a certificated based environment, the certification revocation list (CRL) can be u...

    Yuan Zhou, Zhenfu Cao, Zhenchuan Chai in Information Security Practice and Experience (2006)

  20. No Access

    Chapter and Conference Paper

    Remote Authentication with Forward Security

    Password authentication has been accepted as an easy-to-use solution in network environment to protect unauthorized access to a remote server. Although many schemes have been proposed, none of them can achieve...

    Zhenchuan Chai, Zhenfu Cao, Rongxing Lu in Autonomic and Trusted Computing (2006)

previous disabled Page of 5