期刊文献+

对适用于移动通信的代理签名方案的安全性分析

原文传递
导出
摘要 在代理签名方案中,允许一个原始签名者把他的签名权利委托给一个称为代理签名者的人,然后代理签名者就可以代表原始签名者进行签名.Lu等(Science in China Series F-Information Sciences,2008,51(2):183-195)提出了两个适用于移动通信的代理签名方案.尽管他们证明其方案在随机预言模型下是安全的,本文显示他们的方案是不安全的.
出处 《中国科学:信息科学》 CSCD 2010年第6期796-800,共5页 Scientia Sinica(Informationis)
基金 国家自然科学基金(批准号:60803133) 西安电子科技大学计算机网络与信息安全教育部重点实验室开放课题(批准号:2008CNIS-02) 日本学术振兴会(JSPS)博士后奖学金和电子科技大学青年科技基金资助项目
  • 相关文献

参考文献5

  • 1LU RongXing DONG XiaoLei CAO ZhenFu.Designing efficient proxy signature schemes for mobile communication[J].Science in China(Series F),2008,51(2):183-195. 被引量:9
  • 2Mambo M,Usuda K,Okamoto E.Proxy signatures: delegation of the power to sign messages. IEICE Transactions on Fundamentals of Electronic Communication and Computer Science . 1996
  • 3Boneh D,Lynn B,Shacham H.Short Signatures from the Weil Pairing. Advances in Cryptology-Asiacrypt’2001 . 2001
  • 4Boneh D,Gentry C,Lynn B,et al.Aggregate and verifiably encrypted signatures from bilinear maps. Advances in Cryptology-EUROCRYPT’03 . 2003
  • 5Lee B,Kim H,Kim K.Secure mobile agent using strong non-designated proxy signature. Lecture Notes in Computer Science . 2001

二级参考文献10

  • 1Mambo M,,Usuda K,Okamoto E.proxy signatures:delegation of the power to sign message[].IEICE Trans Funct.1996
  • 2Mambo M,Usuda K,Okamoto E.Proxy signatures for delegation signing operation[].ProcThird ACM Conference on Computer and Communication Security.1996
  • 3Sun H M,Lee N Y,Hwang T.Threshold proxy signatures[].IEE Proc Compu Dig Tech.1999
  • 4Yi L,Bai G,Xiao G.Proxy multi-signature scheme:A new type of proxy signature scheme[].Electronics Letters.2000
  • 5Hwang S J,Chen C C.A new proxy multi-signature scheme[].International Workshop on Cryptology and Network Security.2000
  • 6Shao Z.Proxy signature schemes based on factoring[].Information Processing Letters.2003
  • 7Lu R,Cao Z,Zhou Y.Proxy blind multi-signature scheme without a secure channel[].Applied Mathematics and Computation.2005
  • 8Lu R,Cao Z,Zhu H.A robust(k,n)+1 threshold proxy signature scheme based on factoring[].Applied Mathematics and Computation.2005
  • 9Zhang F,Safavi-Naini R,Susilo W.An efficient signature scheme from bilinear pairings and its applications[].Lecture Notes in Computer Science.2004
  • 10Boneh D,Lynn B,Shacham H.Short signature from the Weft pairing[].Lecture Notes in Computer Science.2001

共引文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部