期刊文献+

具有前向安全性质的限制次数代理签名方案

A Forward-Security Proxy Signature Scheme Restricting Signing Times
下载PDF
导出
摘要 借鉴前向安全的数字签名的思想,利用已有的基于Fiat-Shamir的代理签名方案,引入两个验证参量,修改签名、验证等式及过程,构造了一个具有前向安全特性的代理签名方案。方案的安全性基于大整数因子分解的难度。在本方案中。代理签名者的代理密钥是前向安全的,代理签名者每签名一次即改变代理密钥,在代理签名中同时包含签名的次数,原始签名者通过公布允许签名的次数来限制代理签名者签名的次数。 On the inspiration from forwardsecurity signature scheme, we establish a forwardsecurity proxy signature scheme which can restrict signing times. In this scheme, the key of proxy signer has forwardsecurity property. When he signs a message, the proxy signer changes his proxy signing key each time. The number of signing times is included in the signature. The original signer can limit the number of the proxy singer′s signing time by publishing the number he permitted.
出处 《青岛大学学报(自然科学版)》 CAS 2005年第2期81-84,共4页 Journal of Qingdao University(Natural Science Edition)
关键词 数字签名 前向安全 代理签名 digital signature forward security proxy signature
  • 相关文献

参考文献7

二级参考文献65

  • 1李继国,曹珍富,张亦辰.Improvement of M-U-O and K-P-W proxy signature schemes[J].Journal of Harbin Institute of Technology(New Series),2002,9(2):145-148. 被引量:10
  • 2Mambo M, Usuda K, Okamoto E. Proxy signatures: Delegation of the power to sign messages[J]. IEICE Trans. Fundaments, 1996,E79 - A(9) : 1338 - 1353.
  • 3Sun HM, Chen BJ. Time-stamped proxy signatures with traceable receivers[A]. Proceeding of the ninth national conference on information security[C], 1999. 247-253.
  • 4Sun HM. Design of time-stamped proxy signature with traceable receivers[J]. IEE Prec.-Comput. Digit. Tech., 2000, 147(6):462 - 466.
  • 5Itkis G, Reyzin L. SiBIR: Signer-base intrusion-resilient signatures[ A]. Advances in Cryptology: Proceedings of Crypto'02, LNCS 2442[C]. Sanata Barbara, Califomia, August 2002.
  • 6Anderson R . Invited lecture [ A ] , Fourth Annual Conference on Computer and Communications Security[C]. ACM, 1997.
  • 7Bellare M, Miner SK. A Forward-secure Digital Signature Scheme[A]. Advances in Cryptology-CRPTO'99, I.,NCS 1666[C]. Berlin: Springnr-Verlag, 1999. 431-448.
  • 8CHAUM D, EVERTSE J H, GRAFF J V. An improved protocol for demonstrating possession of discrete logarithms and some generalizations[A]. Proceedings of Eurocrypt'87 [C]. 1988. 127-141.
  • 9CHAUM D, EVERTSE J H, GRAFF J V, et al. Domonstrating possession of a discrete logarithm without levealing it[A]. Proceedings of Crypt'86 [C]. 1987. 200-212.
  • 10LANDFORD S. Weakness in some threshold cryptosystems [A]. Proc of Crypto'96 [C]. 1996. 74-82.

共引文献71

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部