logo

SCIENCE CHINA Information Sciences, Volume 63 , Issue 3 : 139107(2020) https://doi.org/10.1007/s11432-018-9706-0

General construction of revocable identity-based fully homomorphic signature

More info
  • ReceivedMay 8, 2018
  • AcceptedDec 14, 2018
  • PublishedFeb 11, 2020

Abstract

There is no abstract available for this article.


Acknowledgment

This work was supported by National Key R$\&$D Plan of China (Grant No. 2017YFB0802203), National Natural Science Foundation of China (Grant Nos. U1736203, 61732021, 61472165, 61373158), Guangdong Provincial Engineering Technology Research Center on Network Security Detection and Defence (Grant No. 2014B090904067), Guangdong Provincial Special Funds for Applied Technology Research and Development and Transformation of Important Scientific and Technological Achieve (Grant No. 2016B010124009), Zhuhai Top Discipline-Information Security, Guangzhou Key Laboratory of Data Security and Privacy Preserving, Guangdong Key Laboratory of Data Security and Privacy Preserving, National Joint Engineering Research Center of Network Security Detection and Protection Technology.


Supplement

Appendixes A–C.


References

[1] Xiang X Y. Adaptive secure revocable identity-based signature scheme over lattices. Computer Engineering, 2015, 10: 025. Google Scholar

[2] Hung Y H, Tseng Y M, Huang S S. Revocable id-based signature with short size over lattices. Security and Communication Networks, 2017, 7571201: 1-9. Google Scholar

[3] Yang W, Luo W, Luo X. Fully distributed certificateless threshold signature without random oracles. Sci China Inf Sci, 2018, 61: 098101 CrossRef Google Scholar

[4] Liu H, Li X, Ma J. Reconstruction methodology for rational secret sharing based on mechanism design. Sci China Inf Sci, 2017, 60: 088101 CrossRef Google Scholar

[5] Wang H, Chen K, Qin B. A new construction on randomized message-locked encryption in the standard model via UCEs. Sci China Inf Sci, 2017, 60: 052101 CrossRef Google Scholar

[6] Micciancio D, Goldwasser S. Complexity of Lattice Problems: a Cryptographic Perspective. Berlin: Springer, 2012. Google Scholar

[7] Naor M, Nissim K. Certificate revocation and certificate update. IEEE J Sel Areas Commun, 2000, 18: 561-570 CrossRef Google Scholar

Copyright 2020  CHINA SCIENCE PUBLISHING & MEDIA LTD.  中国科技出版传媒股份有限公司  版权所有

京ICP备14028887号-23       京公网安备11010102003388号