期刊文献+

一种性能良好的基于椭圆曲线上的代理签名方案

A Practical Proxy Signature Scheme Based on Elliptic Curve
下载PDF
导出
摘要 提出一种基于椭圆曲线离散对数问题的代理签名方案。新方案除满足代理签名的七条基本性质外,还对目前已有的代理签名方案中尚未很好解决的问题———代理权滥用进行了有效的控制。在新方案中,若代理签名人签名超过证书上规定的次数,则他的私钥就会被破解(对原始签名人无影响),从而真正做到了对签名代理权的控制。另外,新方案基于椭圆曲线,且整个过程参与方少,具有安全性高、密钥量小、便于实现等优点。 A proxy signature scheme based on elliptic curve discrete logarithm problem is proposed. This scheme not only satisfies seven fundamental properties of proxy signature, but also effectively controls the problem of delegation power misuse, which has not been satisfactorily solved at present. In this scheme, the proxy signer can sign a signature N times at most. If he violates the condition, his private key will be revealed. So, this scheme can control the delegation power of the proxy signer. In addition, there are fewer parties involved in the signing process. It is characterized with high safety, less private key quantity and convenient use.
出处 《计算机应用研究》 CSCD 北大核心 2005年第11期99-100,156,共3页 Application Research of Computers
基金 国家自然科学基金资助项目(10271069) 陕西省自然科学基础研究计划资助项目(2002A03) 陕西师范大学重点科研项目资助课题 2005年研究生培养创新基金
关键词 椭圆曲线 代理签名 椭圆曲线离散对数 Elliptic Curve Proxy Signature Elliptic Curve Discrete Logarithm
  • 相关文献

参考文献11

  • 1Lee B, Kim H, Kim K. Secure Mobile Agent Using Strong Non-de-signated Proxy Signature[C]. Proc. of ACISP 2001, 2001. 474-486.
  • 2Lee B, Kim H, Kim K. Strong Proxy Signature and Its Application[C]. Proc. of ACISP 2001, 2001.603-608.
  • 3B Lee, H Kim, K Kim. Strong Proxy Signature and Its Applications[C]. Proc. of SCIS 2001, 2001.603-608.
  • 4Mambo M, Usvda K,Okamotoe. Proxy Signatures: Delegation of the Power to Sign Messages[J]. IEICE Trans. on Fundamentals, 1996, E79-A(9):1338-1354.
  • 5D Pointcheral, J Stern. Security Proofs for Signature[C]. Advances in Cryptology: Eurocrypt'96, Berlin: Springer, 1996.387-398.
  • 6王连海,徐秋亮.基于椭圆曲线密码体制的代理签名方案研究[J].计算机应用研究,2004,21(4):122-123. 被引量:9
  • 7Sun HM, Chen BJ. Time-stamped Proxy Signatures with Traceable Receivers[C]. Proceedings of the 9th National Conference on Information Security, 1999.247-253.
  • 8甘元驹,施荣华.一种安全的有效代理签名方案[J].云南大学学报(自然科学版),2004,26(1):35-37. 被引量:3
  • 9王晓明,符方伟.基于椭圆曲线的限制代理签名方案[J].电子与信息学报,2002,24(12):1825-1828. 被引量:5
  • 10祁明,韩亮.限制性代理签名方案[J].计算机工程,2001,27(2):41-42. 被引量:12

二级参考文献15

  • 1杨先义 等.现代密码新理论[M].北京:科学出版社,2002..
  • 2Koblitz N. Elliptic Curve Cryptosystems[ J]. Mathematics of Computation, 1987,48:203-209.
  • 3Miller V S. Use of Elliptic Curve in Cryptography [ C ]. Advance in Cryptology-CRYPTO' 85 ( Santua Barbara, Calif. , 1985 ), Lecture Notes in Comput Sci, Sping-Verlag, 1986. 218,417-426.
  • 4M Mambo, K Usuda, E Okamoto. Proxy Signatures for Delegating Signing[ C]. Proc. 3rd ACM Conference on Computer and Communications Security, 1996.
  • 5K Zhang. Threshold Proxy Signature Scheme [ C]. 1997 Information Security Workshop, Janpan, 1997. 101-109.
  • 6K Zhang. Nonerepudiable Proxy Signature Scheme [ C ]. Proceeding of ACISP'97, 1997. 237-239.
  • 7N Lee, T Hwang, C Wang. On Zhang' s Nonrepudiable Proxy Signature Scheme[ C]. Proceeding of ACISP' 98,1998. 415-422.
  • 8Lee N,Proc of ACISP 98,1998年,415页
  • 9Zhang K,Proc of ACISP 97,1997年,237页
  • 10Zhang K,1997 Information Security Workshop,1977年,101页

共引文献50

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部