Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Data transmission protocol based on short signature scheme for railway bridge monitoring
ZUO Liming, HU Kaiyu, ZHANG Mengli, CHEN Lanlan
Journal of Computer Applications    2018, 38 (8): 2261-2266.   DOI: 10.11772/j.issn.1001-9081.2018010272
Abstract450)      PDF (973KB)(286)       Save
Aiming at the problems of network security such as information disclosure and tampering in the process of information exchange for railway bridge monitoring systems under open Internet environment, a data transmission protocol based on short signature scheme was proposed for railway bridge monitoring. Firstly, an identity-based short signature scheme was designed on the basis of Boneh's short signature. Then the scheme was proved to be safe under the random oracle model and the Inverse Computational Diffie-Hellman Problem (Inv-CDHP), and it was further applied to the data transmission protocol for railway bridge monitoring. Finally, the key code of the scheme was given and compared with several schemes. The experimental results and analysis show that the average time consumption of the proposed scheme is close to the classical Boneh's scheme, but 6% and 22% lower than that of Fangguo Zhang's scheme and Leyou Zhang's scheme. Therefore, the proposed scheme has more advantages in terms of signature length and efficiency, and can effectively solve the problem of lack of integrity protection and identity reliability authentication of monitoring data.
Reference | Related Articles | Metrics
Efficient and provably secure short proxy signature scheme
ZUO Liming, CHEN Zuosong, XIA Pingping, YI Chuanjia
Journal of Computer Applications    2018, 38 (12): 3455-3461.   DOI: 10.11772/j.issn.1001-9081.2018051159
Abstract320)      PDF (1106KB)(313)       Save
Proxy signature is widely used in large-scale wireless industrial control Internet of things, the efficiency of signature master server can be greatly improved by using proxy signature. A new short proxy signature scheme based on bilinear mapping was proposed to adapt to the application environment with limited bandwidth and weak computing power. Firstly, the security of the proposed scheme was proved based on Computational Diffie-Hellman (CDH) problem and Collusion Attack Algorithm with k traitors (k-CAA) problem under the random oracle model. Then, the performance advantages of the proposed scheme were analyzed with other existing proxy signature and short proxy signature schemes, and the key codes of the proposed scheme were given. The experimental results show that, the proposed scheme performs one scalar multiplication operation and one hash operation in proxy signature generation; two bilinear pairing operation, one scalar multiplication operation and two hash operations in signature verification. Compared with other similar proxy signature schemes, the proposed scheme has advantages in computational performance and is suitable for application scenarios with weak computational power and limited transmission capacity.
Reference | Related Articles | Metrics
Improved certificate-based aggregate proxy signature scheme
ZUO Liming, GUO Hongli, ZHANG Tingting, CHEN Zuosong
Journal of Computer Applications    2016, 36 (10): 2758-2761.   DOI: 10.11772/j.issn.1001-9081.2016.10.2758
Abstract378)      PDF (708KB)(375)       Save
The analysis of aggregate proxy signature scheme proposed by Yu et al. (YU X Y, HE D K. A certificate-based aggregate proxy signature scheme. Journal of Central South University (Science and Technology), 2015, 46(12): 4535-4541.) showed that a valid signatures could be forged for any messages while knowing a valid signature. Therefore, an improved certificate-based aggregate proxy signature scheme was proposed and a new attack model was given. The new scheme was proved to be existentially unforgeable for the new attacker in random oracle model. The results show that the proposed scheme can resist conspiracy attacks and forgery attacks, and it is more suitable for the computation-constrained and real-time tasks.
Reference | Related Articles | Metrics
Provable identity-based signcryption scheme
ZUO Liming, CHEN Renqun, GUO Hongli
Journal of Computer Applications    2015, 35 (3): 712-716.   DOI: 10.11772/j.issn.1001-9081.2015.03.712
Abstract702)      PDF (770KB)(456)       Save

Through the cryptanalysis of a signcryption scheme without bilinear pairing proposed by Gao et al. (GAO J, WU X, QIN Y. Secure certificateless signcryption scheme without bilinear pairing.Application Research of Computers,2014,31(4):1195-1198) recently, the scheme could not resist public-key substitute attacks. Then a new ID-based signcryption scheme without bilinear pairing was proposed and the proposed scheme was proved to be secure in the random oracle model under the first type attacker. Finally, a contrast analysis of efficiency was made between the new scheme and other schemes. Compared with other signcryption schemes, the new scheme uses only 3 Hash operations and 7 point multiplication operations, so it has higher computational efficiency.

Reference | Related Articles | Metrics