期刊文献+

基于Guillou-Quisquater体制的前向安全代理签名方案 被引量:2

A forward-secure proxy signature scheme based on Guillou-Quisquater scheme
下载PDF
导出
摘要 对最近提出的一个前向安全强代理数字签名方案进行了安全性分析,发现该方案不具有前向安全性.提出了一个基于Guillou-Quisquater签名体制的前向安全代理数字签名方案,并分析了所提方案的安全性. Through the security analysis of a forwardsecure strong proxy digital signature scheme proposed recently,find that the scheme has no forward security at all.A forwardsecure proxy signature scheme based on GuillouQuisquater scheme is proposed,and its security is analysed.
出处 《西北师范大学学报(自然科学版)》 CAS 2005年第4期27-30,共4页 Journal of Northwest Normal University(Natural Science)
基金 国家自然科学基金资助项目(10271069) 陕西省自然科学基金资助项目(2004A14) 陕西师范大学重点项目
关键词 前向安全 数字签名 代理签名 伪造攻击 forward security digital signature proxy signature forgery attack
  • 相关文献

参考文献9

  • 1Mambo M, Usuda K, Okamoto E. Proxy signatures: delegation of the power to sign messages [J]. IEICE Trans Fundam, 1996, E79 - A (9):1338-1354.
  • 2SunH M, Lee N Y, Hwang T. Threshold proxy signatures [ J ]. IEE Proc Computers & Digital Techniques, 1999, 146(5): 259-263.
  • 3Sun H M. Design of time-stamped proxy signatures with traceable receivers[J]. IEE Proc Computers & Digital Techniques, 2000, 147(6): 462-466.
  • 4YILJ, BAI G Q, XIAO G Z. Proxy multisignature scheme: A new type of proxy signature scheme[J]. Electron Letter, 2000, 36 (6): 527-528.
  • 5王晓明,符方伟,张震.前向安全的多重数字签名方案[J].计算机学报,2004,27(9):1177-1181. 被引量:22
  • 6Bellare M, Miner S K. A forward - secure digital sitgature scheme [ A]. Advances in CryptologyCrypto '99 [C]. Berlin: Springer- Verlag, 1999.431-448.
  • 7Fiat A, Shamir A. How to prove yourself:practical solutions to identification and signature problem[A]. Advances in Cryptology-Crypto '86 [C]. Berlin: Springer-Verlag, 1986. 186-194.
  • 8谭作文,刘卓军.一个前向安全的强代理签名方案[J].信息与电子工程,2003,1(4):257-259. 被引量:18
  • 9Schneier 吴世忠 祝世雄 张文政 译.应用密码学:协议、算法与源程序[M].北京:机械工业出版社,2000.365-365.

二级参考文献25

  • 1Kamoto T.. A digital multisignature scheme using bijective public-key cryptosystem. ACM Transactions on Computer Systems, 1988, 6(8): 432~441
  • 2Boldyreva A.. Efficient threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman-group signature scheme. In: Proceedings of the Public Key Cryptography'03, Florida, USA, 2003, 31~46
  • 3Ohta K., Okamoto T.. Multi-signature scheme secure against active insider attacks. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences, 1999, E82-A(1) : 21~31
  • 4Lin C.Y., Wu T.C., Hwang J.J.. ID-based structured multisignature schemes. In: de Decker B ed.. Advances in Network and Distributed Systems Security. Boston: Kluwer Academic Publishers, 2001, 45~59
  • 5He W.H. Weaknesses in some multisignature schemes for specified group of verifiers. Information Processing Letters, 2002, 83(2): 95~99
  • 6Micali S., Ohta K., Reyzin L.. Accountable-subgroup multisignature: Extended abstract. In: Proceedings of the ACM Conference on Computer and Communication Security 2001(CCS 2001). Philadelphia, PA, USA, 2001, 245~254
  • 7Harn L.. Group-oriented(t,n) threshold digital signature scheme and digital multisignature. IEEE Proceedings of Computer Digital Technology, 1994, 141(5): 307~313
  • 8Hwang S.J., Chen C.Y., Chang C.C.. An encryption /multisignature scheme with specified receiving groups. Computer Systems Science and Engineering, 1998, 13(2): 109~112
  • 9Doi H., Mambo M., Okamoto E.. On the security of the RSA-based multisignature scheme for various group structures. In: Proceedings of the 5th Australasian Conference-ACISP2000, Canberra, Australasian, 2000, 352~367
  • 10Popescu C.. Blind signature and blind multisignature schemes using elliptic curves. Studia Universitatis, "Babes-Bolyai", Informatica, 1999, XLIII(2): 43~49

共引文献37

同被引文献12

  • 1王晓明,陈火炎,符方伟.前向安全的代理签名方案[J].通信学报,2005,26(11):38-42. 被引量:35
  • 2张波,徐秋亮.一个强前向安全的代理签名方案[J].计算机工程与应用,2006,42(9):109-110. 被引量:9
  • 3[1]Mambo M,Usuda K,Okamoto E.Proxy signatures for delegating signing operation.Proc 3rd ACM Conference on Computer and Communications Secutity,ACM Press,1996:48 -57
  • 4[2]Lee B,Kim H,KimK.Secure mobile agent using strong non-designated proxy signature.Proc of ACISP'2001,2001:474-486
  • 5[3]Anderson Rsos.Two remarks on public key cryptology.Invited Lecture,The fourth ACM Computer and Communication Security,Zurich,Switzerland,1997:1-7
  • 6[6]Itkis G,Reyzin L.Forward-secure signatures with optimal signing and verifying.Advances in Cryptology-Crypto01,Lecture Notes of Computer Science,2001; 2139:332-354
  • 7Mambo M,Usuda K,Okamoto E.Proxy signatures for delegating signing operation[C] //ACM.Proc 3rd ACM Conference on Compeer and Communications Secutity,New Delhi:ACM Press,1996:48-57.
  • 8Lee B,Kim H,Kim K.Secure mobile agent using strong non-designated proxy signature[C] //Springer.Proc of ACISP'2001,Heidelberg:Springer Berlin,2001:474-486.
  • 9Zhang K.Threshold proxy signature schemes[C] //Springer.1997 Information Security Workshop,Japan:Springer Berlin,1997:191-197.
  • 10Anderson R.Two remarks on public key cryptology.Invited Lecture[C] //Springer.The fourth ACM Computer and Communication Security,Zurich:Switzerland,1997:1-7.

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部