高技术通讯(英文版)2007,Vol.13Issue(2):207-209,3.
Feasibility analysis of two identity- based proxy ring signature schemes
Feasibility analysis of two identity- based proxy ring signature schemes
摘要
Abstract
Recently , proxy ring signature schemes have been shown to be useful in various applications , such as electronic polling, electronic payment, etc. Although many proxy ring signature schemes have been proposed, there are only two identity- based proxy ring signature schemes have been proposed until now, I.e., Cheng's scheme and Lang's scheme. It's unlucky that the two identity- based proxy ring signature schemes are unfeasible . This paper points out the reasons why the two identity- based proxy ring signature schemes are unfeasible. In order to design feasible and efficient identity-based proxy ring signature schemes from bilinear pairings , we have to search for other methods .关键词
proxy signature/ring signature/proxy ring signatures/identity-based cryptograph/bilinear pairingsKey words
proxy signature/ring signature/proxy ring signatures/identity-based cryptograph/bilinear pairings分类
信息技术与安全科学引用本文复制引用
Wang Huaqun,Zhang Lijun,Zhao Junxi..Feasibility analysis of two identity- based proxy ring signature schemes[J].高技术通讯(英文版),2007,13(2):207-209,3.基金项目
Supported by the National Natural Science Foundation of China (No.60432040). (No.60432040)