期刊文献+

一个限制次数的代理签名方案 被引量:1

A Number-limited Proxy Signature Scheme
下载PDF
导出
摘要 为解决现有的签名方案中尚没有有效的对签名次数进行限制的问题,结合前向安全签名和一次性限制代理签名的技术,构造了一个能够限制次数的代理签名方案。方案中代理密钥是前向安全的,每一次进化对应一次签名,进化的次数在系统参数中就被限定了。如果代理人两次用同一代理密钥签名,他的私钥就会被破译。方案不需要第三方,其安全性基于解离散对数的困难性。 There is no valid proxy signature scheme which limits signing times until now. Combining the technique of forward-security signature and a one-time signature scheme, we constructed a proxy signature without TTP which can limit signing times. In the scheme, the proxy key is forward security, every generation refers to s specific signature and the generations time is limited. If the proxy signer wans to use the same proxy key to signature different messages, his private key will be cracked. The scheme's security is based on the difficulty of solving the discrete logarithm problem.
出处 《青岛大学学报(自然科学版)》 CAS 2005年第4期72-75,共4页 Journal of Qingdao University(Natural Science Edition)
关键词 数字签名 代理签名 离散对数 digital signature proxy signature discrete logarithm
  • 相关文献

参考文献9

  • 1Mambo M,Usuda K,Okamoto E.Proxy signatures:delegation of the power to sign messages[J].IEICE Fundam,1996,E79-A(9):1338 - 1354.
  • 2Zhang K.Threshold proxy signature schemes[M].Berlin:Springer verlag,1998:191 - 197.
  • 3Sun H M.An efficient nonrepudiable threshold proxy signature scheme with known signers[J].Computer Communications,1999,22(8) :717 - 722.
  • 4Sun H M,Chen B J.Time-stamped proxy signatures with traceable receivers[A].Proceedings of the ninth National Conference on Information Security[C].Taiwan:Chaoyan University of Technology,1999:247 - 253.
  • 5Sun H M.Design of time-stamped proxy signatures with traceable receivers[J].IEE Proc Computers & Digital Techniques,2000,147(6) :462 - 466.
  • 6祁明,韩亮.限制性代理签名方案[J].计算机工程,2001,27(2):41-42. 被引量:12
  • 7Ross Anderson.Two remarks on public key cryptology.Invited Lecture[A].The fourth ACM Computer and Communication Security[C],1997.
  • 8Bellare M,Miner SK.A Forward-Secure Digital Signature Scheme[A].Advances in Cryptology-CRPTO99,LNCS 1666[C],Berlin:Springer-Verlag,1999,431 - 448.
  • 9谭作文,刘卓军.一个前向安全的强代理签名方案[J].信息与电子工程,2003,1(4):257-259. 被引量:18

二级参考文献14

  • 1[1]Ross Anderson.Two remarks on public key cryptology. Invited Lecture [A].The fourth ACM Computer and Communication Security [C],1997.
  • 2[2]A Fiat,A Shamir.How to prove yourself:practical solutions to identification and signature problems [A].Advances in Cryptology-Crypto'86, Lecture Notes of Computer Science [C],1986,1987: 186-194.
  • 3[3]M Bellare,S K Miner. A forward-secure digital signature scheme [A]. Advances in Cryptology-Crypto'99, Lecture Notes of Computer Science [C],1999, 1666: 431-448.
  • 4[4]M Abdalla,L Reyzin. A new forward-secure digital signature scheme [A]. Asiacrypt'00, Lecture Notes of Computer Science [C], 2000,1976:116-129.
  • 5[5]L C Guillou, J J Quisquater. A "paradoxical" identity-based signature scheme resulting from zero-knowledge [A]. Advances in Cryptology-Crypto'88, Lecture Notes of Computer Science [C],1988, 403: 216-231.
  • 6[6]G Itkis,L Reyzin. Forward-secure signatures with optimal signing and verifying [A]. Advances in Cryptology-Crypto'01, Lecture Notes of Computer Science [C],2001, 2139:332-354.
  • 7[7]M Mambo,K Usuda,E Okamato. Proxy signature: Delegation of the power to sign messages [A]. IEICE Trans. Fundamentals [C],1996, E79-A: 1338-1353.
  • 8[8]Zuhua Shao. Proxy signature schemes based on factoring [A]. Information Processing Letter [J], 2003, 85: 137-143.
  • 9[9]B Lee, H Kim, K Kim. Strong proxy signature and its applications [A]. SCI2001 [C],2001, 2: 603-608.
  • 10[10]J Y Lee, J H Cheon, S Kim. An analysis of proxy signatures: Is a secure channel necessary? [A]. CT-RST 2003 [C],2003, 2612: 68-79.

共引文献26

同被引文献9

  • 1吴克力,张宏,刘凤玉.签名次数受限的代理签名方案[J].兵工学报,2005,26(6):816-819. 被引量:2
  • 2[1]Zhang K.Threshold proxy signature schemes[M].Berlin:Springer-verlag,1998:191-197.
  • 3[2]Sun H M.An efficient nonrepudiable threshold proxy signature scheme with known signers[J].Computer Communications,1999,22(8):717-722.
  • 4[3]SUN H M.Design of time2stamped proxy signatures with traceable receivers[J].IEE Proc Computers & Digital Techniques,2000,147(6):462-466.
  • 5[4]Yi L J,Bai G Q,Xiao G Z.Proxy multisignature scheme:A new type of proxy signature scheme[J].Electron Lett,2000,36(6):527-528.
  • 6[8]Mambo M,Usuda K,Okmoto E.Proxy signatures:delegation of the power to sign messages[J].IEICE Fundam,1996,E79-A(9):1338-1354.
  • 7[9]Bellare M,Miners K.A forward-Secure digital signature scheme[C].Berlin:In Advances in Cryptology'99,LNCS1666,Springer-verlag,1999:431-448.
  • 8祁明,L.Harn.基于离散对数的若干新型代理签名方案[J].电子学报,2000,28(11):114-115. 被引量:67
  • 9祁明,韩亮.限制性代理签名方案[J].计算机工程,2001,27(2):41-42. 被引量:12

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部