对一类无证书强代理签名方案的攻击及改进
DOI: 10.13190/jbupt.201001.80.sunshf, PP. 80-83
Keywords: 无证书公钥体制,代理签名,替换公钥攻击,双线性对
Abstract:
References
[1] | Mambo M, Usuda K, Okamoto E. Proxy signatures for delegating signing Operation//Proceedings of CCS96. New Delhi: ACM, 1996: 48-57.
|
[2] | Shamir A. Identity-based cryptosystems and signature schemes//Blakley G R, Chaum D. Crypto 1984. New York: Springer-Verlag, 1984: 47-53.
|
[3] | Al-Riyami S, Paterson K G. Certificateless public key cryptography//Laih C S. Asiacrypt 2003. Taipei: Springer-Verlag, 2003: 452-473.
|
Full-Text