Citation: | ZHU Hongfei, TAN Yu'an, YU Xiao, et al., “An Identity-Based Proxy Signature on NTRU Lattice,” Chinese Journal of Electronics, vol. 27, no. 2, pp. 297-303, 2018, doi: 10.1049/cje.2017.09.008 |
M. Mambo, K. Usuda and E. Okamoto, "Proxy signatures:Delegation of the power to sign messages", IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol.79, No.9, pp.1338-1354,1996.
|
Y. Jiang, F. Kong and X. Ju, "Lattice-based proxy signature", Proc. of 2010 International Conference on Computational Intelligence and Security, Nanjing, China, pp.382-385, 2010.
|
Z. Shao, "Provably secure proxy-protected signature schemes based on rsa", Computers and Electrical Engineering, Vol.35, No.3, pp.497-505, 2009.
|
F. Zhang, R. Safavi Naini and C.Y. Lin, "New proxy signature, proxy blind signature and proxy ring signature schemes from bilinear pairing", IACR Cryptology EPrint Archive, http://eprint.iacr.org/2003/104,2003-05-29.
|
J. Xu, Z. Zhang and D. Feng, "Id-based proxy signature using bilinear pairings", Proc. of Parallel and Distributed Processing and Applications-ISPA 2005 Workshops, Nanjing, China, pp.359-367, 2005
|
R.J. Zhu, Y.A. Tan, Q.X. Zhang, et al., "Determining image base of firmware files for arm devices", IEICE Transactions on Information and Systems, Vol.E99.D, No.2, pp.351-359, 2016.
|
K. Shum and V.K. Wei, "A strong proxy signature scheme with proxy signer privacy protection", Proc. of Eleventh IEEE International Workshops on Enabling Technologies:Infrastructure for Collaborative Enterprises, Pittsburgh, PA, USA, pp.55-56, 2002.
|
R.J. Zhu, Y.A. Tan, Q.X. Zhang, et al., "Determining image base of firmware for arm devices by matching literal pools", Digital Investigation, Vol.16, pp.19-28, 2016.
|
Z. Shao, "Proxy signature schemes based on factoring", Information Processing Letters, Vol.85, No.3, pp.137-143, 2003.
|
X. Du, M. Guizani and H.H. Chen, "A routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks", IEEE Transactions on Wireless Communications, Vol.8, No.3, pp.1223-1229, 2009.
|
X. Du and H.H. Chen, "Security in wireless sensor networks", IEEE Wireless Communications, Vol.15, No.4, pp.60-66, 2007.
|
R.J. Zhu, B.F. Zhang, J.J. Mao, et al., "A methodology for determining the image base of arm-based industrial control system firmware", International Journal of Critical Infrastructure Protection, Vol.16, No.3, pp.26-35, 2017.
|
X.S. Zhang, Y.A. Tan, Y. Xue, et al., "Cryptographic key protection against frost for mobile devices", Cluster Computing, Vol.20, No.3, pp.2393-2402, 2017.
|
Y. Xue, Y.A. Tan, C. Liang, et al., "An optimized data hiding scheme for Deflate codes", Soft Computing, pp.1-11, 2017. doi: 10.1007/s00500-017-2651-2.
|
X. Du, Y. Xiao, M. Guizani, et al., "An effective key management scheme for heterogeneous sensor networks", Ad Hoc Networks, Vol.5, No.1, pp.24-34, 2007.
|
A. Shamir, "Identity-based cryptosystems and signature schemes", Proc. of Workshop on the Theory and Application of Cryptographic Techniques,Santa Barbara, CA, USA, pp.47-53, 1984.
|
F. Yan, Y.A. Tan, Q.X. Zhang, et al., "An effective raid data layout for object-based de-duplication backup system", Chinese Journal of Electronics, Vol.25, No.5, pp.832-840, 2016.
|
K.A. Shim, "An identity-based proxy signature scheme from pairings", Proc. of International Conference on Information and Communications Security, Raleigh, NC, USA, pp.60-71, 2006.
|
W. Wu, Y. Mu, et al., "Identity-based proxy signature from pairings", Proc. of International Conference on Autonomic and Trusted Computing, Hong Kong, China, pp.22-31, 2007.
|
K. Gu, W.J. Jia and C.L. Jiang, "Efficient identity-based proxy signature in the standard model", The Computer Journal, Vol.58, No.4, pp.792-807,2015.
|
P. W. Shor, "Algorithms for quantum computation:Discrete logarithms and factoring", Proc. of 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, USA, pp.124-134, 1994.
|
J. Li, Z. Pan, J. Zheng, et al., "The security analysis of quantum sagr04 protocol in collective-rotation noise channel", Chinese Journal of Electronics, Vol.24, No.4, pp.689-693, 2015.
|
K.S. Kim, D. Hong and I.R. Jeong, "Identity-based proxy signature from lattices", Journal of Communications and Networks, Vol.15, No.1, pp.1-7, 2013.
|
C. Wang and M. Qi, "Lattice-based proxy signature scheme", Journal of Information and Computational Science, Vol.8, No.12, pp.2451-2458, 2011.
|
L. Zhang and Y. Ma, "A lattice-based identity-based proxy blind signature scheme in the standard model", Mathematical Problems in Engineering, doi:10.1155/2014/307637, Vol.2014, 2014.
|
J. Xie, Y.P. Hu, J.T. Gao, et al., "Efficient identity-based signature over ntru lattice", Frontiers of Information Technology and Electronic Engineering, Vol.17, No.2, pp.135-142, 2016.
|
T. Güneysu, V. Lyubashevsky and T. Pöppelmann, "Latticebased signatures:optimization and implementation on reconfigurable hardware", IEEE Transactions on Computers, Vol.64, No.7, pp.1954-1967, 2015.
|
J. Hoffstein, N. Howgrave-Graham, J. Pipher, et al., "Ntrusign:Digital signatures using the ntru lattice", Proc. of Cryptographers' Track at the RSA Conference, San Francisco, CA, USA, pp.122-140, 2003.
|
C. Gentry, C. Peikert and V. Vaikuntanathan, "Trapdoors for hard lattices and new cryptographic constructions", Proc. of the Fortieth Annual ACM Symposium on Theory of Computing, Victoria, British Columbia, CA, pp.197-206, 2008.
|
V. Lyubashevsky, "Lattice signatures without trapdoors", Proc. of 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, pp.738-755, 2012.
|
C. Peikert, Decade of Lattice Cryptography, Now Publishers, Breda, Netherlands, pp.1-140, 2016.
|
D. Stehlé and R. Steinfeld, "Making NTRU as secure as worstcase problems over ideal lattices", Proc. of 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, pp.27-47, 2011.
|
H.F. Zhu, Y.A. Tan, X.S. Zhang, et al., "A round-optimal lattice-based blind signature scheme for cloud services", Future Generation Computer Systems, Vol.73, No.8, pp.106-114, 2017.
|
K. Gu, W.J. Jia and Y.M. Deng, "Secure and efficient multiproxy signature scheme in the standard model", Chinese Journal of Electronics, Vol.25, No.1, pp.93-99, 2016.
|
H.Z. Du and Q.Y. Wen, "Efficient certificateless designated Verifier signatures and proxy signatures", Chinese Journal of Electronics, Vol.18, No.1, pp.95-100, 2009.
|
X.D. Yang, C.F. Wang and L. Zhang, "On-line/off-line threshold proxy re-signatures", Chinese Journal of Electronics, Vol.23, No.2, pp.248-253, 2014.
|
Y. Sun, C.X. Xu and H. Wang, "Improved multi-proxy signature scheme without random oracles", Chinese Journal of Electronics, Vol.20, No.2, pp.200-206, 2011.
|
L. Babai, "On lovászlattice reduction and the nearest lattice point problem", Combinatorica, Vol.6, No.1, pp.1-13, 1986.
|