期刊文献+

存在特权集的代理门限群签名方案 被引量:6

Proxy Threshold Group-oriented Signature Schemes with Privileged Subsets
下载PDF
导出
摘要 在Schnorr代理签名的基础上,结合存在特权集的门限群签名,提出了两个存在特权集的代理群签名方案。它们具有门限群签名的特点,同时实现了不同代理人的不等代理权限功能。基于离散对数假设,对这两个代理门限群签名方案进行了安全分析。 This paper proposes two proxy threshold group -oriented signature schemes on basis of Schnorr proxy signature and threshold group-oriented schemes with privileged subsets.The proposed schemes have the properties of the threshold group -oriented schemes in which a part of proxy signers are privileged.The paper provides the security analysis of the schemes.
出处 《计算机工程与应用》 CSCD 北大核心 2004年第25期31-34,共4页 Computer Engineering and Applications
基金 国家自然科学基金资助项目(编号:10371127) 信息安全国家重点实验室开放课题项目资助
关键词 代理签名 SCHNORR签名 门限群签名 离散对数假设 proxy signature,Schnorr signature,threshold group-oriented signature,discrete logarithm assumption
  • 相关文献

参考文献12

  • 1A Boldyreva,A Palacio,B Warinschi.Secure Proxy Signature Schemes for Delegation of Signing Rights [EB/OL].Http://eprint.iacr.org/2003
  • 2Y Desmedt ,Y Frankle. Shared Generation of Authenticators and Signatures[C].In: Advances in Cryptology-CRYPTO'91, Berlin: SpringerVerlag, 1992: 457~469
  • 3L Harn. Group-oriented(t,n)-Threshold Digital Signature Scheme Based on Discrete Logarithms[J].IEE Pro of Computers and Digital Techniques, 1994; 141 (5) :307~313
  • 4S J Kim,S J Park,D H Won.Proxy Signatures,revisited[C].In:ICICS97,LNCS 1334, New York: Springer-Verlag, 1997: 223~232
  • 5B Lee,H Kim,K Kim. Strong Proxy Signature and Its Applications[C].In :Proc of SCIS,2001:603~6081
  • 6B Lee,H Kim,K Kim. Secure Mobile Agent Using Strong Non-designated Proxy Signature[C].In:Proc of ACISP,LNCS 2119,Berlin:SpringerVerlag, 2001: 474~486
  • 7M Mambo ,K Usuda,E Okamoto. Proxy Signatures:Delegation of the Power to Sign Messages[C].In:IEICE Trans. Fundamentals, Vol. E79-A,1996:1338~1353
  • 8C P Schnorr. Efficient Signature Generation by Smart Cards[C].In:Journal of Cryptology, 1991 ;4(3): 161~174
  • 9石怡 冯登国.一类新型(tj,t,n)-门限群签名方案的设计与分析[C]..密码学进展-China Crypto''2000[C].科学出版社,2000..
  • 10Stinson D R.Cryptography Theory and Practice[M].Second Edition,New York: CRC Press,2002: 282~285

二级参考文献19

  • 1Chaum, D., van Antwerpen, H.Undeniable signatures. In: Brassard, G., ed. Proceedings of the Advances inCryptology-Crypto'89. LNCS 435, Berlin: Springer-Verlag, 1989. 212~216.
  • 2Chaum, D. Zero-Knowledge undeniable signatures. In: Damgard, I.B., ed. Proceedingsof the Advances in Cryptology- Eurocrypt'90. LNCS 473, Berlin: Springer-Verlag, 1991. 458~464.
  • 3Desmedt, Y. Society and group oriented cryptography: a new concept. In: Pomerance,C., ed. Proceedings of the Advances in Cryptology-Crypto'87. LNCS 293, Berlin:Springer-Verlag, 1988. 120~127.
  • 4Desmedt, Y., Frankel, Y. Threshold cryptosystems. In: Brassard, G., ed.,Proceedings of the Advances in Cryptology-Crypto'89. LNCS 435, Berlin: Springer-Verlag,1990. 307~315.
  • 5Harn, L., Yang, S. Group-Oriented undeniable signature schemes without theassistance of a mutually trusted party. In: Seberry, J., Zheng, Y., eds. Proceedings ofthe Advances in Cryptology-Auscrypt'92. LNCS 718, Berlin: Springer-Verlag, 1993. 133~142.
  • 6Langford, S.K. Weakness in some threshold cryptosystems. In: Koblitz, N., ed.Proceedings of the Advances in Cryptology- Crypto'96. LNCS 1109. Berlin: Springer-Verlag,1996. 74~82.
  • 7Lin, C.-H., Wang, C.-T., Chang, C.-C. A group-oriented (t,n) undeniable signaturescheme without trusted center. In: Pieprzyk, J., Seberry, J., eds. Proceedings of theInformation Security and Privacy, ACISP'96. LNCS 1172, Berlin: Springer-Verlag, 1996. 266~274.
  • 8Lee, N.-Y., Hwang, T. Group-Oriented undeniable signature schemes with a trustedcenter. Computer Communications, 1999,22: 730~734.
  • 9Gennaro, R., Krawczyk, H., Rabin, T. RSA-Based undeniable signature. In: Kaliski,B., ed. Proceedings of the Advances in Cryptology-Crypto'97. LNCS 1294, Berlin:Springer-Verlag, 1997. 132~148.
  • 10Shoup, V. Practical threshold signatures. In: Vaudenay, S., ed., Proceedings ofthe Advances in Cryptology-Eurocrypt'2000. LNCS 1807, Berlin: Springer-Verlag, 2000. 207~220.http://www.shoup.net/papers/

共引文献2

同被引文献33

引证文献6

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部