期刊文献+

高效的不可否认的门限代理签名新方案 被引量:1

New Efficient Nonrepudiable Threshold Proxy Signature Scheme
下载PDF
导出
摘要 基于Kim等人的门限代理签名方案,Sun提出了已知签名人的不可否认的门限代理签名方案。在Sun的方案中,代理签名人不能否认他们所进行的代理签名。随后,Hsu等人证明Sun方案不能抵抗共谋攻击,并提出了相应的改进方案。论文首先证明了Hsu等人的改进方案不能抵抗公钥替换的内部攻击,即任何恶意的内部攻击者,不需要其他代理签名人的密钥,对任意的消息能够伪造一个有效的门限代理签名。然后提出了一种不可否认的门限代理签名新方案,能同时抵抗内部的公钥替换攻击和共谋攻击。就计算复杂度和通信成本而言,该文的方案比Hsu等人的方案更有效、更实用。 Based on Kim et al.'s threshold proxy signature scheme,Sun proposed a nonrepudiable threshold proxy signature scheme with known signers.In Sun's scheme,actual proxy signers cannot deny the signature they have signed. Recently,Hsu et al.explained that Sun's scheme is vulnerable against the conspiracy attack,and proposed an improved scheme that can withstand the conspiracy attack.In this paper we show that their improved scheme is insecure against insider's public-key substitution attack.Any malicious insider attacker without any secret keys of the other signers can forge a valid proxy signature for any messages.Then,we present a new nonrepudiable threshold proxy signature scheme that can withstand both the insider's public-key substitution attack and the conspiracy attack.Furthermore,the presented scheme is more efficient than Hsu et al.'s in terms of computational complexities and communication costs.
出处 《计算机工程与应用》 CSCD 北大核心 2005年第31期14-16,31,共4页 Computer Engineering and Applications
基金 国家自然科学基金(编号:60173038) 广东省自然科学基金(编号:010421 000759 980690)资助
关键词 数字签名 代理签名 门限代理签名 digital signature,proxy signature,threshold proxy signature
  • 相关文献

参考文献15

  • 1Mambo M ,Usuda K,Okamoto E.Proxy signatures for delegating signing operation[C].In:Proceeding of the 3rd ACM Conference on Computer and Communications Security,ACM,New York, 1996:48~57.
  • 2Mambo M, Usuda K, Okamoto E.Proxy signatures: delegation of the power to sign messages[J].IEICE Transactions on Fundamentals of Electronic Communications and Computer Science,1996;E79-A(9):1338~1354.
  • 3Kim S,Park S, Won D.Proxy signatures[C].In: ICICS'97, Lecture Notes in Computer Science, Berlin: Springer, 1997: 223~232.
  • 4Zhang K.Threshold proxy signature schemes[C].In: 1997 Information Security Workshop, Japan, 1997:191~197.
  • 5Lee N Y,Hwang T,Wang C H.On Zhang's nonrepudiable proxy signature schemes[C].In:ACISP'98,Lecture Notes in Computer Science, Berlin:Springer, 1998:414~422.
  • 6Sun H M ,Lee N Y,Hwang T.Threshold proxy signature schemes[J]. IEE Proc-Computers & Digital Techniques,1999;146(5):259~263.
  • 7Sun H M.An efficient nonrepudiable threshold proxy signature scheme with known signers[J].Computer Communications,1999;22(8):717~722.
  • 8Hwang M S,Lin I C,Lu E J L.A secure nonrepudiable threshold proxy signature scheme with known signers[J].International Journal of Informatica, 2000; 11 (2): 1~8.
  • 9Hsu C L,Wu T S,Wu T C.New nonrepudiable threshold proxy signature scheme with known signers[J].The Journal of System and Software ,2001 ;58:119~124.
  • 10伊丽江,白国强,肖国镇.代理多重签名:一类新的代理签名方案[J].电子学报,2001,29(4):569-570. 被引量:70

二级参考文献24

  • 1[1]M.Mambo,K.Usuda,and E.Okamot.Proxy signatures:Delegation of the power to sign messages [J].IEICE Trans.Fundamentals,1996,E79-A(9):1338-1354.
  • 2[2]S.Kim,S.Park and D.Won proxy signatures,revisited [A].Proc.of ICICS'97,International Conference on Information and Communications Security [C],LNCE,1334,1997:223-232.
  • 3[3]K.Ohta and t.Okamoto.A digital multisignature scheme based on the Fiat-Shamir scheme [A].Advances in Cryptology—ASIACRYTP'91 [C]:.139-148.
  • 4Nechvatal, James. Public key cryptography. In: G J Simmons ed. Contemporary Cryptology: The Science of Information Integrity. Piscatoway, N J: IEEE Press, 1991. 177~288
  • 5M Mambo, K Usuda, E Okamoto. Proxy signatures for delegating signing operation. In: Proc of the 3rd ACM Conf on Computer and Communications Security. New Delhi, India:ACM Press, 1996. 48~57
  • 6M Mambo, K Usuda, E Okamoto. Proxy signatures:Delegation of the power to sign messages. IEICE Trans on Fundam, 1996, E79-A (9): 1338~1354
  • 7K Zhang. Threshold proxy signature schemes. 1997 Information Security Workshop, Japan, 1997
  • 8H M Sun, N Y Lee, T Hwang. Threshold proxy signatures.IEE Proc-Computers & Digital Techniques, 1999, 146 (5): 259~263
  • 9S Kim, S Park, D Won. Proxy signatures, revisited. In: Proc of the Int'l Conf on Information and Communications Security (ICICS'97), LNCS 1334. Berlin: Springer-Verlag, 1997. 223~232
  • 10H M Sun. An efficient nonrepudiable threshold proxy signature scheme with known signers. Computer Communications,1999, 22(8): 717~722

共引文献89

同被引文献11

  • 1Hsu C L,Wu T S.Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attack.Applied Mathematics and Computation,2004
  • 2Wang G,Bao F,Zhou J,Deng R H.Comments on a threshold proxy signature scheme based on the RSA cryptosystem.IEEE Transaction on knowledge and data engineering,2004,16 (10):1309~1311
  • 3Hwang M S,Lu E J L,Lin I C.A practical (t,n) threshold proxy signature scheme based on the RSA cryptosystem.IEEE Transaction on Knowledge and Data Engineering,2003,15 (6):1552~1560
  • 4Shoup V.Practical threshold signature.In:Proc.Advanced in Cryptoltgy-Eurocrypt,2000.207~220
  • 5Huang Hui-Feng,Chang Chin-Chen.An efficient and practical (t,n)threshold proxy signature scheme with known signers.Fundamenta Informatica,2003,56(3):243~253
  • 6Tzeng S F,Hwang M S,Yang C Y.An improvement of nonrepudiable threshold proxy signature scheme with known signers.Computer and Security,2004,23:174~178
  • 7Tan Z W,Liu Z J.Cryptanalysis of threshold proxy signature scheme.MM Research Preprints.Dec.2004(23):226~233
  • 8Kim S,Park S,Won D.Proxy signature,revisited.In:Proc.of ICICS'97,LNCS,1334.223~232
  • 9Zhang K.Threshold proxy signature scheme.Information Security Workshop,Japan,1997.191~197
  • 10Mambo M,Usuda K,Okamoto E.Proxy signature:Delegation of the power to sign message.IEICE Trans.Fundamentals,1996,9:1338~1354

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部