{"title":"基于id的环代理签名","authors":"Baodian Wei, Fangguo Zhang, Xiaofeng Chen","doi":"10.1109/ISIT.2007.4557359","DOIUrl":null,"url":null,"abstract":"In this paper, by combining the functionalities of proxy signatures and ring signatures, we propose a new concept, named ring proxy signature, which is a proxy signature generated by an anonymous member from a set of potential signers. We construct two ID-based ring proxy signature schemes. The security analysis is provided as well.","PeriodicalId":193467,"journal":{"name":"2007 IEEE International Symposium on Information Theory","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"ID-based Ring Proxy Signatures\",\"authors\":\"Baodian Wei, Fangguo Zhang, Xiaofeng Chen\",\"doi\":\"10.1109/ISIT.2007.4557359\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, by combining the functionalities of proxy signatures and ring signatures, we propose a new concept, named ring proxy signature, which is a proxy signature generated by an anonymous member from a set of potential signers. We construct two ID-based ring proxy signature schemes. The security analysis is provided as well.\",\"PeriodicalId\":193467,\"journal\":{\"name\":\"2007 IEEE International Symposium on Information Theory\",\"volume\":\"16 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-06-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2007 IEEE International Symposium on Information Theory\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISIT.2007.4557359\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 IEEE International Symposium on Information Theory","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISIT.2007.4557359","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
In this paper, by combining the functionalities of proxy signatures and ring signatures, we propose a new concept, named ring proxy signature, which is a proxy signature generated by an anonymous member from a set of potential signers. We construct two ID-based ring proxy signature schemes. The security analysis is provided as well.