期刊文献+

典型代理多重签名方案的分析与改进

Analysis and improvement for proxy multi-signature scheme
下载PDF
导出
摘要 YBX代理多重签名方案是不安全的,攻击者在不知道原始签名者密钥的情况下,能够伪造代理签名密钥,假冒代理签名者对文件进行签名。在全面分析攻击方案的基础上,构造了一种增强的代理多重签名方案。新方案克服了YBX方案的代理转移、不具有强不可否认性等缺陷,除了具有普通签名方案的安全性外,还具有接收方可查的时控代理多重签名方案的性质。 The proxy multi-signature scheme called YBX is not safe. An attacker can forge the key pair of proxy signature without the original private key, and disguise himself as proxy to sign document. Based on the analysis of attack scheme, an improved proxy multi-signature scheme was proposed. The new scheme overcomes the defects of YBX scheme such as proxy transferring and not having strong undeniability. The new scheme is safe. Moreover, the original signer can set up the time limit of the proxy power holding by the proxy signer and can trace the receiver of the signature.
出处 《石油大学学报(自然科学版)》 EI CSCD 北大核心 2005年第2期128-130,135,共4页 Journal of the University of Petroleum,China(Edition of Natural Science)
基金 山东省科技厅资助项目(2004GG1101021)
关键词 签名方案 多重 不可否认性 代理签名 签名者 攻击者 新方案 安全性 密钥 文件 proxy multi-signature discrete logarithm problem Chinese remainder theorem
  • 相关文献

参考文献6

二级参考文献11

  • 1[1]Mambo M, Usuda K, Okamoto E. Proxy signatures: Delegation of the power to sign messages. IEICE Trans on Fundamentals, 1996, E79-A(9): 1338~1354
  • 2[2]Kim S, Park S, Won D. Proxy signatures, Revisited. In: Proc of Int'l Conf on Information and Communications Security, LNCS 1334. Springer-Verlag, 1997. 223~232
  • 3[3]Ohta K, Okamoto T. A digital multisignature scheme based on the Fiat-Shamir Scheme. In: Advances in Cryptology-ASIACRYPT'91, Springer-Verlag, 139~148
  • 4[1]M.Mambo,K.Usuda,and E.Okamot.Proxy signatures:Delegation of the power to sign messages [J].IEICE Trans.Fundamentals,1996,E79-A(9):1338-1354.
  • 5[2]S.Kim,S.Park and D.Won proxy signatures,revisited [A].Proc.of ICICS'97,International Conference on Information and Communications Security [C],LNCE,1334,1997:223-232.
  • 6[3]K.Ohta and t.Okamoto.A digital multisignature scheme based on the Fiat-Shamir scheme [A].Advances in Cryptology—ASIACRYTP'91 [C]:.139-148.
  • 7ZHANG K.Threshold proxy signature scheme [A].Information Security Workshop[C],Japan,1977.101-109.
  • 8YI L,BAI G,XIAO G.Proxy multi-signature scheme: A new type of proxy signature scheme[J].Electronics Letters,2000,36(6): 527-528.
  • 9HORSTER P,MICHELS M,PETERSEN H.Meta-multisignature schemes based on the discrete logarithm problem [A].Proc of IFIP SEC'95 [C].Cape Town,South Africa,Chapman&Hall,1995.128-142.
  • 10祁明,L.Harn.基于离散对数的若干新型代理签名方案[J].电子学报,2000,28(11):114-115. 被引量:67

共引文献107

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部