1-out-of-n Signatures from a Variety of Keys
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
A threshold signature scheme for group communications without a shared distribution center
Future Generation Computer Systems - Special issue: Computational science of lattice Boltzmann modelling
Proceedings of the 8th annual conference on Genetic and evolutionary computation
Anonymous Proxy Authorization Signature Scheme with Forward Security
CSSE '08 Proceedings of the 2008 International Conference on Computer Science and Software Engineering - Volume 03
Evolutionary Algorithm and Its Application in Artificial Immune System
IITA '08 Proceedings of the 2008 Second International Symposium on Intelligent Information Technology Application - Volume 03
Proxy Authorization Signature with Conditional Anonymity and Its Application
KAM '08 Proceedings of the 2008 International Symposium on Knowledge Acquisition and Modeling
Bionic evolution based intrusion detection system
CCDC'09 Proceedings of the 21st annual international conference on Chinese Control and Decision Conference
A new (t, n)-threshold multi-secret sharing scheme
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Generalized Parallel Interference Cancellation With Near-Optimal Detection Performance
IEEE Transactions on Signal Processing
Efficient statistical parallel interference cancellation for DS-CDMA in Rayleigh fading channels
IEEE Transactions on Wireless Communications
Learning and optimization using the clonal selection principle
IEEE Transactions on Evolutionary Computation
Genetically modified multiuser detection for code division multiple access systems
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
Bionic evolution is an adaptive artificial intelligence technique; it mimics natural evolution process to solve optimization problems. In the paper, we present an improved proxy signature scheme based on bionic evolution. In the scheme, the original private key is generated with bionic evolution algorithm by a successive optimizing process. The optimizing selection algorithm renders effective protection for the private key and the signature system, avoids the insecure randomness in secret parameter selection, and thus prevents generalized signature forgery and coalition attack of original signer and proxy signers. The algorithms of the scheme take great advantage of the superiority of ECC (Elliptic Curves Cryptosystem), such as high efficiency, short key length and etc. The scheme can achieve the same security with less storing space, smaller communication band-width and less overheads of the system and thus proves to be applicable to such circumstances as with restricted computation ability and integrated space, circumstances with limited bandwidth yet requiring for high-speed operation.