期刊文献+

基于RSA的证实数字签名方案 被引量:6

A Confirmer Signature Scheme Based on RSA
下载PDF
导出
摘要 验证者要知道一个证实数字签名的有效性,必须得到一个称为证实者的第3方的帮助与合作。签名者的安全性和证实签名的“不可见性”是一个证实数字签名方案必须具备的两个重要特性。考虑到RSA是应用最广泛的公钥密码体制之一,该文提出了一种完全基于RSA的证实数字签名方案,分析表明,该方案是一种安全高效的证实数字签名实现方案。 Without the help and cooperation of a designated confirmer, a verifier can not determine the validity of a confirmer signature. The subscriber's security and the confirmer signature invisibility are characteristic to a confirmer signature scheme. Considering RSA is one of the most widely used cryptosystems, this paper proposes a confirmer signature scheme based on RSA for the first time. The scheme shows that the new scheme is an implementation of secure and efficient confirmer signature.
出处 《计算机工程》 CAS CSCD 北大核心 2006年第7期154-156,165,共4页 Computer Engineering
基金 国家自然科学基金资助项目(10471078) 教育部高等学校博士学科点专项科研基金资助项目(20040422004) 曲阜师范大学博士科研基金资助项目
关键词 证实数字签名 不可否认签名 RSA 数字签名 Confirmer signature Undeniable signature RSA Digital signature
  • 相关文献

参考文献9

  • 1Chaum D,Van Antwerpen H.Undeniable Signatures[C].Proc.of the Advances in Cryptography-CRYPTO'89,LNCS 435.Berlin:Springer-Verlag,1989:212-216.
  • 2National Institute of Standard and Technology.Secure Hash Standard[S].NIST FIPS PUB 180-1,Washington:Department of Commerce,NIST,http://csrc.nist.gov/cryptval/html,1995.
  • 3Chaum D.Designated Confirmer Signatures[C].Proc.of the Advances in Cryptography,LNCS 950.Berlin:Springer-Verlag,1994:86-89.
  • 4Okamoto T.Designated Confirmer Signatures and Public-key Encryption Are Equivalent[C].Proc.of the Advances in Crypto-raphy,LNCS 839.Berlin:Springer-Verlag,1994:61-74.
  • 5Michels M,Stadler M.Generic Constructions for Secure and Efficient Confirmer Signature Schemes[C].Proc.of the Advances in Cryptography,LNCS 1403.Berlin:Springer-Verlag,1998:406-421.
  • 6Camenisch J,Michels M.Confirmer Signature Schemes Secure Against Adaptive Adversaries (Extended Abstract)[C].Proc.of the Advances in Cryptography,LNCS 1807.Berlin:Springer-Verlag,2000:243-258.
  • 7Rivest R,Shamir A,Adleman L.A Method of Obtaining Digital Signatures and Public-key Cryptosystems[J].Communications of the ACM,1978,21 (2):120-126.
  • 8王尚平,王育民,张亚玲.基于DSA及RSA的证实数字签名方案[J].软件学报,2003,14(3):588-593. 被引量:43
  • 9王贵林,卿斯汉.一个证实数字签名方案的安全缺陷[J].软件学报,2004,15(5):752-756. 被引量:18

二级参考文献10

  • 1[1]Chaum D, van Antwerpen H. Undeniable signatures. In: Brassard G, ed. Proceedings of the Advances in Cryptology (CRYPTO'89). LNCS 435, Berlin: Springer-Verlag, 1990. 212~216.
  • 2[2]Chaum D. Designated confirmer signatures. In: De Santis A, ed. Proceedings of the Advances in Cryptology (EUROCRYPT'94). LNCS 950, Berlin: Springer-Verlag, 1994. 86~89.
  • 3[3]Okamoto T. Designated confirmer signatures and public-key encryption are equivalent. In: Desmendt YG, ed. Proceedings of the Advances in Cryptology (CRYPTO'94). LNCS 839, Berlin: Springer-Verlag, 1994. 61~74.
  • 4[4]Michels M, Stadler M. Generic constructions for secure and efficient confirmer signature schemes. In: Nyberg K, ed. Proceedings of the Advances in Cryptology (EUROCRYPT'98). LNCS 1403, Berlin: Springer-Verlag, 1998. 406~412.
  • 5[5]Camenisch J, Michels M. Confirmer signature secure against adaptive adversaries. In: Preneel B, ed. Proceedings of the Advances in Cryptology (EUROCRYPT 2000). LNCS 1807, Berlin: Springer-Verlag, 2000. 243~258.
  • 6[6]Rivest R, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 1978,21(2):120~126.
  • 7[7]Cramer R, Shoup V. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk H, ed. Proceedings of the Advances in Cryptology (CRYPTO'98). LNCS 1462, Berlin: Springer-Verlag, 1998. 13~25.
  • 8[8]National Institute of Standards and Technology. Digital signature standard. NIST FIPS PUB 186, Department of Commerce, NIST, 1994.
  • 9[9]National Institute of Standards and Technology. Secure hash standard. NIST FIPS PUB 180-1, Washington D.C.: Department of Commerce, NIST, 1995. http://csrc.nist.gov/cryptval/shs.html.
  • 10王尚平,王育民,张亚玲.基于DSA及RSA的证实数字签名方案[J].软件学报,2003,14(3):588-593. 被引量:43

共引文献47

同被引文献17

引证文献6

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部