期刊文献+

基于Schnorr代理授权的社区管理方案

Community management based on schnorr delegation signature
下载PDF
导出
摘要 授权签名可以控制签名代理者、验证时间和验证者,不少著名的方案都可以归类为shcnorr授权签名,以强代理签名方案为例分析了最近的一些攻击,并提出改进的办法。针对电子政务的实际应用需求,以改进的签名算法作为理论基础,设计了适合社区的信息交换管理模型,能提高电子政务系统的安全性和管理效率。 Delegation signature schemes have the capability of controlling a signature for the proxy signer in signing, the time and the verifier in validating, and many of them can be classed into Schnorr-typed delegation signature. Using strong proxy signature as an instance in point, a common attack is analyzed and an improvement is made. To satisfy the practical requirement in E-govemment, a management model for information exchange among communities is proposed based on the new scheme, which can enhance the security and efficiency at the same time.
出处 《计算机工程与设计》 CSCD 北大核心 2005年第8期1991-1993,共3页 Computer Engineering and Design
基金 国家973重点基础研究发展计划基金项目(G20000263)
关键词 授权签名 电子政务 数据交换 社区管理 delegation signature E-government data exchange
  • 相关文献

参考文献15

  • 1Chaum D, Van Antwerpen H. Undeniable signatures[C].CRYPTO '89, LNCS 435, Springer-Verlag, 1990. 212-216.
  • 2Chaum D. Designated confir mer signatures[C]. EUROCRYPT'94, LNCS, Springer Verlag, 1994. 86-91.
  • 3Markus Jakobssonl, Kazue Sako, Russell Impagliazzol. Designated verifier proofs and their applications[C].Advances in Cryptology - EUROCRYPT '96, LNCS 1070, 1996.143-154.
  • 4Boyar J, Chaum D, Damgkd I, et al. Convertible undeniable signatures[C].Advances in Cryptology -Proceedings, 1990.
  • 5Mambo M, Usuda K, Okamoto E. Proxy signatures for delegating signing operation[C].Proc 3rd ACM Conference on Computer and Communications Security, ACM Press, 1996.48-57.
  • 6Kim S J, Park S J, Won D H. Proxy signatures, revisited[C].ICICS 1997, LNCS 1334, Springer-Verlag, 1997. 223-232.
  • 7Lee B, Kim H, Kim K.Strong proxy signature and its applications[C].Proceedings of SCIS, 2001.603-608.
  • 8Lee J Y, Cheon J H, Kim S. An analysis of proxy signatures: Is a secure channel necessary[C]. Topics in Cryptology - CT-RSA2003, LNCS 2612, Springer-Verlag, 2003.68-79.
  • 9Guilin Wang, Feng Bao, Jianying Zhou, et al. Security analysis of some proxy signatures[C]. In ICISC 2003, LNCS 2971 2004,Springer-Verlag, 2004. 305-319.
  • 10Mohamed Al-Ibrahim, Anton Cerny. Authentication of anycast communication[C]. MMM-ACNS, 2003.419-423.

二级参考文献9

  • 1[1]Lysyanskaya A, Ramzan Z. Group blind signatures: a scalable solution to electronic cash [A]. Proceedings of 2nd Internatianal Conference on Financial Cryptography (FC'98) [C]. Berlin: Springer-Verlag, 1998.184-197.
  • 2[3]Camenisch J, Stadler M. Efficient group signature schemes for large groups [A]. Proceedings of 17th Annual International Cryptology Conference (CRYPTO'97) [C]. Berlin: Springer-Vefiag, 1997.410-424.
  • 3[4]Ateniese G, Tsudik G. Some open issues and new directions in group signatures[A]. Proceedings of 3rd International Conference on Financial Cryptography (FC'99)[C]. Berlin: Springer-Verlag, 1999. 196-211.
  • 4[5]Mambo M, Usuda K, Okamoto E. Proxy signatures:Delegation of the power to sign messages[J]. IEICE Trans Fundamentals, 1996,E7-A(9): 1338-1353.
  • 5[6]Brands S. Untraceable off line cash in wallets with observers[A]. Proceedings of 13th Annual International Cryptology Conference (CRYPTO'93) [C].Berlin :Springer-Verlag, 1993. 302- 318.
  • 6王育民,通信网的安全.理论与技术,1999年
  • 7Zhang K,Proc 1st Int Workshop on Information Security(ISW 97),1997年,282页
  • 8Yi L,Electron Lett,2000年,36卷,6期,527页
  • 9李继红,肖国镇.广义ElGamal签名的一种安全性分类[J].西安电子科技大学学报,1998,25(5):655-658. 被引量:4

共引文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部