期刊文献+

一个改进的强代理签名方案 被引量:5

A Modified Strong Proxy Signature Scheme
下载PDF
导出
摘要 数字签名是密码学的重要问题之一 ;代理签名是一种特殊的数字签名 ,它是指当某个签名人 (原始签名人 )由于某种原因不能签名时 ,将签名权委托给他人 (代理签名人 )替自己行使签名权。回顾了Lee等人提出的强代理签名方案和代理多签名方案以及Sun等人提出对其强不可伪造性的分析。在强代理签名方案的基础上 ,提出了改进的强代理签名方案 ,该方案具有强不可伪造性 ,从而可以有效地防止原始签名人对代理签名人进行恶意攻击 。 Digital signature scheme is an important research topic in cryptography.Proxy signature is a special digital signature.It allows a signer,called an original signer,to delegate his/her signing capability to another person,called a proxy signer,to create a signature on behalf of him/her when he/she cannot sign a message for some reason.Lee,et al.'s strong proxy signature scheme and proxy multi-signature scheme are reviewed.Sun,et al.'s analyze on strong unforgeability is mentioned.A modified strong proxy signature scheme with strong unforgeability,which will efficiently prevent an original signer from malicious attacks is presented.The proposed idea is extended into proxy multi-signature schemes.
出处 《计算机应用研究》 CSCD 北大核心 2004年第8期119-121,共3页 Application Research of Computers
关键词 数字签名 代理签名 强代理签名 代理多签名 强不可伪造性 Digital Signature Proxy Signature Strong Proxy Signature Proxy Multi-signature Strong Unforgeability
  • 相关文献

参考文献11

  • 1T ElGamal. A Public Key Cryptosystem and Signature Scheme Based on Discrete Logarithms[ J ]. IEEE Trans. Information Theory, 1985,31(4) :469-472.
  • 2S Yen,C Laih. New Digital Signature Scheme Based on Discrete Logarithm [ J ]. Electronics Letters, 1993,29 ( 12 ): 1120-1121.
  • 3R L Rivest, A Shamir, L Adleman. A Method for Obtaining Digital Signatures and Public- key Cryptosystems [ J ]. Communications of the ACM,1978,21 (2) :120-126.
  • 4D Chaum. Blind Signatures for Untraceable Payments [ C ]. Advances in Cryptology- Crypto' 82, New York: Plenum Press, 1983. 199-203.
  • 5D Chaum, E Heijist. Group Signatures [ A ]. Advances in CryptologyEUROCRYPT '91 ,Lecture Notes in Computer Science 547[ C]. Berlin: Springer- Verlag, 1991. 257 - 265.
  • 6M Mambo, K Usuda, E Okamoto. Proxy Signatures: Delegation of the Power to Sign Messages [ J ]. IEICE Trans. Fundamentals, 1996,79(9) :1338-1353.
  • 7S Kim, S Park, D Won. Proxy Signatures, Revisited [ A ]. Proc. of ICICS'97:1 st International Conference on Information and Communications Security, LNCS 1334 [ C ]. Berlin: Springer-Verlag, 1997. 223-232.
  • 8P Kotzanikolaous, M Burmcster, V Chrisskopoulos. Secure Transactions with Mobile Agents in Hostile Environments [ C ]. Proc. ACISP, LNCS 1841,2000. 289-297.
  • 9B Lee, H Kim, K Kim. Strong Proxy Signature and Its Applications [ J]. SCIS2001,2001,2(2) :603-608.
  • 10B Lee,H Kim,K Kim. Secure Mobile Agent Using Strong Non-designated Proxy Signature [ C]. Proc. of ACISP, LNCS 2119, Berlin:Springer- Verlag ,2001. 474 - 486.

共引文献1

同被引文献30

  • 1黄文平.一些不需要安全通道代理签名的分析与改进[J].计算机工程与应用,2005,41(28):127-130. 被引量:6
  • 2蔡勉,康莉.一种安全的多级代理签名方案[J].中国科学院研究生院学报,2006,23(5):653-659. 被引量:9
  • 3陈凯,鲍皖苏.几个改进的LKK代理签名方案分析[J].计算机工程与应用,2007,43(18):150-152. 被引量:2
  • 4MAMBO M, USUDA K, OKAMOTO E. Proxy signatures for delegating signing operation [ C]//Proceedings of 3rd ACM Conference on Computer and Communication Security. New Delhi: ACM Press, 1996:48 -57.
  • 5LEE B, KIM H, KIM K. Strong proxy signature and its application [ C]//The 2001 Symposium on Cryptography and Informatiou Security. Oiso: [ s. n. ], 2001:603 - 608.
  • 6SCHNORR C P. Efficient identification and signatures for smart cards [ C]//Crypto 89: Advances in Cryptology, LNC1435. Berlin: Springer-Verlag, 1990:239 - 252.
  • 7MAMBO M, USUDA K, OKAMOTO E. Proxy signature: delegation of the power to sign messages [J]. IEICE Transaction on Fundamentals of Electronic Communications and Computer Science, 1996, 9: 1338-1354.
  • 8LEE B, KIM H, KIM K. Strong proxy signature and its applications[J]. SCIS 2001, 2001, 2(2) : 603-608.
  • 9SUN Hung-Min, HSIEH Bin-Tsan . On the secur ity of some proxy signature schemes [J]. Cryptology ePrint Archive, Report 2003/068, http ://eprint. iacr. org, 2003.
  • 10Mambo M,Usuda K,Okamoto E.Proxy signature:Delegation of the power to sign messages[J].IEICE Transaction on Fundamentals of Electronic Communications and Computer Science, 1996(9) : 1335- 1354.

引证文献5

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部