期刊文献+

A New Proxy Signature Scheme with Message Recovery Using Self-Certified Public Key 被引量:3

A New Proxy Signature Scheme with Message Recovery Using Self-Certified Public Key
下载PDF
导出
摘要 A proxy signature scheme with message recovery using self-certified public key is proposed, which withstands public key substitution attacks, active attacks, and forgery attacks. The proposed scheme accomplishes the tasks of public key verification, proxy signature verification, and message recovery in a logically single step. In addition, the proposed scheme satisfies all properties of strong proxy signature and does not use secure channel in the communication between the original signer and the proxy signature signer. A proxy signature scheme with message recovery using self-certified public key is proposed, which withstands public key substitution attacks, active attacks, and forgery attacks. The proposed scheme accomplishes the tasks of public key verification, proxy signature verification, and message recovery in a logically single step. In addition, the proposed scheme satisfies all properties of strong proxy signature and does not use secure channel in the communication between the original signer and the proxy signature signer.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期219-222,共4页 武汉大学学报(自然科学英文版)
基金 SupportedbytheNationalNaturalScienceFundationofChina(60072018)
关键词 Key words cryptography proxy signature SELF certified public key non REPUDIATION Key words cryptography proxy signature self certified public key non repudiation
  • 相关文献

参考文献12

  • 1李继国,曹珍富,张亦辰.Nonrepudiable Proxy Multi—Signature Scheme[J].Journal of Computer Science & Technology,2003,18(3):399-402. 被引量:12
  • 2Kaisa Nyberg,Rainer A. Rueppel.Message recovery for signature schemes based on the discrete logarithm problem[J].Designs Codes and Cryptography (-).1996(1-2)
  • 3Li Ji-guo,Cao Zhen-fu.Improvement of a Threshold Proxy Signature Scheme[].Journal of Computer Research and Development.2002
  • 4李继国,曹珍富,张亦辰.Improvement of M-U-O and K-P-W proxy signature schemes[J].Journal of Harbin Institute of Technology(New Series),2002,9(2):145-148. 被引量:10
  • 5Mambo M,Usuda K,Okamoto E.Proxy Signatures: Delegation of the Power to Sign Messages[].IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences.1996
  • 6Yi L J,Bai G Q,Xiao G Z.Proxy Multi-Signature Scheme:A New Type of Proxy Signature Scheme[].Electronics Letters.2000
  • 7Sun H M.An Efficient Nonrepudiable Threshold Proxy Signature Scheme with Known Signers[].Computer Communications.1999
  • 8Li Ji-guo,Cao Zhen-fu,Zhang Yi-chen.Nonrepudiable Proxy Multi-Signature Scheme[].Journal of Computer Science and Technology.2003
  • 9Nyberg K,Rueppel R A.Message Recovery for Signature Scheme Based on Discrete Logarithm Problem[].Designs Codes and Cryptography.1996
  • 10Hwang M S,Lin I C,Lu E J L.A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers[].International Journal of Informatica.2000

二级参考文献22

  • 1Yi L J, Bai G Q, Xiao G Z. Proxy multi-signature scheme: A new type of proxy signature scheme. Electron. Lett., 2000, 36: 527-528.
  • 2Hwang S J, Shi C H. Specifiable proxy signature schemes. In 1999 Computer Symposium, Taipei, 1999,pp.190-197.
  • 3E1Gamal T. A public key cryptosystem and signature scheme based on discrete logarithms. IEEE Trans.,1985, IT-31(4): 469--472.
  • 4Sun H M, Chen B J. Time-stamped proxy signatures with traceable receivers. In Proc. the Ninth National Conference on Information Security, 1999, pp.247-253.
  • 5Sun H M. Design of time-stamped proxy signatures with traceable receivers. In IEE Proc. Computers & Digital Techniques, 2000, 147(6): 462-466.
  • 6Mambo M, Usuda K, Okamoto E. Proxy signatures for delegating signing operation. In Proc. 3rd ACM Conference on Computer and Communications Security,ACM Press, 1996, pp.48--57.
  • 7Mambo M, Usuda K, Okamoto E. Proxy signatures:Delegation of the power to sign messages. IEICE Trans.Fundam., 1996, E79-A(9): 1338--1354.
  • 8Zhang K. Threshold proxy signature schemes. In 1997 Information Security Workshop, Japan, 1997, pp.191-197.
  • 9Kim S, Park S, Won D. Proxy signatures, revisited. In Pvoc. ICICS'97, Int. Conf. on Information and Communications Security, LNCS, Springer-Verlag, 1997,1334: 223-232.
  • 10Sun H M, Lee N Y, Hwang T. Threshold proxy signatures. In lEE Proc. Computers & Digital Techniques,1999, 146(5): 259-263.

共引文献16

同被引文献8

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部