期刊文献+

有向签名方案的分析和可转换扩展

Analysis and Convertibility Extension on Directed Signature Schemes
下载PDF
导出
摘要 为保护用户的隐私,授权签名能够控制签名只有在签名者或可信第三方(TTP)的协助下由特定的验证者进行验证,有向签名是其中一种变型。然而,出于特定条件下除去验证限制的目的,签名者希望把同一类型的多个授权签名转换成自认证签名。通过改进QZX有向签名方案,使不可否认签名可以分别被TTP或者签名者协助验证,并同时具有批量转换和TTP监管的功能。 In order to protect user's privacy,Delegation signature scheme can force signatures to be convinced by the designated verifier only with the help of the signer or a trusted third party (TTP),and directed signature scheme is one of the variants of delegation signature.However,for the sake of removing the limitation of verification under special conditlons,the signer is in need of the conversion capability of multiple delegation signatures according to the same conversion parameter.Two improved schemes are proposed based on the QZX directed signature schemes,which can be confirmed by either the signer or the confirmer.The schemes can satisfy requirements of both multiple signatures conversion and TTP supervision.
出处 《计算机工程与应用》 CSCD 北大核心 2006年第5期146-148,155,共4页 Computer Engineering and Applications
关键词 可转换不可否认签名 有向签名 可信第三方监管 convertible undeniable signature,directed signature,TIP supervision
  • 相关文献

参考文献10

二级参考文献22

  • 1[1]Chaum D, van Antwerpen H. Undeniable signatures. In: Brassard G, ed. Proceedings of the Advances in Cryptology (CRYPTO'89). LNCS 435, Berlin: Springer-Verlag, 1990. 212~216.
  • 2[2]Chaum D. Designated confirmer signatures. In: De Santis A, ed. Proceedings of the Advances in Cryptology (EUROCRYPT'94). LNCS 950, Berlin: Springer-Verlag, 1994. 86~89.
  • 3[3]Okamoto T. Designated confirmer signatures and public-key encryption are equivalent. In: Desmendt YG, ed. Proceedings of the Advances in Cryptology (CRYPTO'94). LNCS 839, Berlin: Springer-Verlag, 1994. 61~74.
  • 4[4]Michels M, Stadler M. Generic constructions for secure and efficient confirmer signature schemes. In: Nyberg K, ed. Proceedings of the Advances in Cryptology (EUROCRYPT'98). LNCS 1403, Berlin: Springer-Verlag, 1998. 406~412.
  • 5[5]Camenisch J, Michels M. Confirmer signature secure against adaptive adversaries. In: Preneel B, ed. Proceedings of the Advances in Cryptology (EUROCRYPT 2000). LNCS 1807, Berlin: Springer-Verlag, 2000. 243~258.
  • 6[6]Rivest R, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 1978,21(2):120~126.
  • 7[7]Cramer R, Shoup V. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk H, ed. Proceedings of the Advances in Cryptology (CRYPTO'98). LNCS 1462, Berlin: Springer-Verlag, 1998. 13~25.
  • 8[8]National Institute of Standards and Technology. Digital signature standard. NIST FIPS PUB 186, Department of Commerce, NIST, 1994.
  • 9[9]National Institute of Standards and Technology. Secure hash standard. NIST FIPS PUB 180-1, Washington D.C.: Department of Commerce, NIST, 1995. http://csrc.nist.gov/cryptval/shs.html.
  • 10Cramer R, Slump V. A Practial Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack [ A ].CRYPTO'98[C]. Santa Barbaba: Springer-Verlag, 1998. 13-25.

共引文献61

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部