Entity

Time filter

Source Type


Zhang Y.-L.,Northwest Normal University | Zhou D.-R.,Northwest Normal University | Li C.-Y.,Northwest Normal University | Zhang Y.-J.,Gansu Health Vocational College | Wang C.-F.,Northwest Normal University
Tongxin Xuebao/Journal on Communications | Year: 2015

The security model of the certificateless aggregate signature scheme with universal designated verifier was studied, and then a certificateless aggregate signature scheme with universal designated verifier using bilinear pairings was proposed. In the random oracle mode, based on the hardness of the computational Diffie-Hellman problem, the new scheme was proved to be secure against three attacks of certificateless aggregate signature scheme with universal designated verifier. Meanwhile, the scheme satisfies properties of strong designated verify and non-transferability. Furthermore, the length of final aggregate signature is equivalent as the length of signal user's signature, it is more efficient than others because the pairing computation is fixed among public verifies and designed verifies. ©, 2015, Tongxin Xuebao/Journal on Communications. All right reserved. Source


Zhang Y.-L.,Northwest Normal University | Li C.-Y.,Northwest Normal University | Wang C.-F.,Northwest Normal University | Zhang Y.-J.,Gansu Health Vocational College
Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology | Year: 2015

The security of certificateless signature scheme which was proposed by He et al. (2014) is analyzed, and the security of the certificateless aggregate signature scheme which was proposed by Ming et al. (2014) is analyzed too. It is pointed out that the Key Generation Center (KGC) can realize the passive attacks in the Ming's scheme. It is also pointed out that KGC can realize the passive attack and initiative attack respectively in the Nimg's scheme. The processes of concrete forgery attacks which perfored by KGC are shown, and the possible reasons are analyzed. Finally, two improved Ming's schemes are proposed. The improved schemes not only overcome the security problem of original scheme but also have an advantage that the length of aggregated signature is fixed. ©, 2015, Science Press. All right reserved. Source


Mu X.,Lanzhou University | Mu X.,Gansu Health Vocational College | Peng P.,Lanzhou University | Sun Q.,Lanzhou University | And 5 more authors.
Gongneng Cailiao/Journal of Functional Materials | Year: 2015

This paper compares the effects of methanol and glutaraldehyde on properties of silk fibroin/gelatin composite porous scaffolds, the silk fibroin/gelatin composite porous scaffolds with equal proportion were prepared by freeze-drying method, cross-linked by methanol and glutaraldehyde respectively. Microstructures of scaffolds were observed; porosities, water absorption ratios and swelling ratios were measured; thermal stabilities and mechanical properties were investigated. Then differences of scaffolds, structures and properties by different cross linking agents were compared. Results showed that scaffolds cross-linked by glutaraldehyde had a more regular, uniform pore distribution, higher porosities, water absorption ratios, swelling ratios and mechanical properties. Glutaraldehyde-crosslinked silk fibroin/gelatin composite porous scaffolds, properties are more excellent. ©, 2015, Journal of Functional Materials. All right reserved. Source


Zhang Y.,Northwest Normal University | Zhang Y.,Gansu Health Vocational College | Li Y.,Northwest Normal University | Wang C.,Northwest Normal University | Wang C.,National Chin - Yi University of Technology
Information Technology and Control | Year: 2015

Strong designated verifier signature shows that only designated user can verify the validity of the signature, others who have not signer’s private key or verifier’s private key cannot judge the signature’s originator. Lee et al. presented a designated verifier signature scheme to realize signature’s verification in the limited time. We demonstrate that Lee et al.’s scheme is insecure. Other legal users can forge valid signatures which convince designated verifier. In this paper, we show a concrete forgery attack of Lee et al.’s scheme and propose a new strong designated verifier signature scheme with time limit. In our new scheme, message and time stamp don’t need transmit in public, which are embedded in signature via the method of signcryption. Only signer and designated verifier can recover those secrete values. Based on the Bilinear Diffie-Hellman problem and Pre-Image Resistance assumption, it is proved that new strong designated verifier signature scheme can resist the ordinary forgery attack and replay attack, and enforce signature verification with time limit. © 2015, Kauno Technologijos Universitetas. All rights reserved. Source

Discover hidden collaborations