期刊文献+

基于椭圆曲线的代理多签名方案的安全性分析 被引量:7

Security Analysis of Some Proxy Multi-Signature Schemes Based on Elliptic Curve Cryptosystem
下载PDF
导出
摘要 在一个安全的代理签名方案中,只有指定的代理签名人能够代表原始签名人生成代理签名.基于椭圆曲线离散对数问题,纪家慧和李大兴提出了一个代理签名方案和一个代理多签名方案,陈泽雄等人给出了另外两个代理多签名方案.但是,在他们的方案中,原始签名人能够伪造代理签名私钥.为了抵抗原始签名人的伪造攻击,改进了代理签名密钥的生成过程,并对改进的方案进行了安全性分析. In a secure proxy signature scheme, only the designated proxy signer could create a valid proxy signature on behalf of the original signer. Based on the elliptic curve discrete logarithm problem, Ji and Li proposed a proxy signature scheme and a proxy multi-signature scheme and Chen et al. proposed two proxy multi-signature schemes. However, in their schemes, the original signer can forge proxy secret key. To eliminate the original signer' s forgery attacks, a modification of the proxy key generation stage is proposed. Security analysis of the improved scheme is also presented.
出处 《小型微型计算机系统》 CSCD 北大核心 2006年第5期798-801,共4页 Journal of Chinese Computer Systems
基金 国家重点"九七三"基础研究发展规划项目(2004CB318004)资助 国家自然科学基金项目(90204016 60373048)资助 国家"八六三"高技术研究发展计划项目(2003AA144030)资助.
关键词 椭圆曲线离散对数问题 代理签名 代理多签名 密码分析 elliptic curve discrete logarithm problem proxy signature proxy multi-signature eryptanalysis
  • 相关文献

参考文献1

二级参考文献8

  • 1[1]S Kim, S Park, D Won. Pxoxy signatures, revisited. In: Proc of ICICS'97, Int'l Conf on Information and Communications Security. Berlin: Springer-Verlag, 1997. 223~232
  • 2[2]M Mambo, K Usuda, E Okamoto. Proxy signature: Delegation of the power to sign messages. IEICE Trans on Fundamentals of Electronics Communications and Computer Sciences, 1996, E79-A(9): 1338~1354
  • 3[3]M Mambo, K Usuda, E Okamoto. Proxy signatures for delegation signing operation. In: Proc of the 3rd ACM Conf on Computer and Communications Security. New York: ACM Press, 1996. 48~57
  • 4[4]B Lee, H Kim, K Kim. Strong proxy signature and its applications. The 2001 IEICE Symp on Cryptography and Information Security, Oiso, Japan, 2001
  • 5[5]K Ohta, T Okamoto. A digital multisignature scheme based on the Fiat-Shamir scheme. In: Advances in Cryptology-ASIACrypt'91. Berlin: Springer-Verlag, 1991. 139~148
  • 6[6]L Yi, G Bai, G Xiao. Proxy multi-signature scheme: A new type of proxy signature scheme. Eletronic Letters, 2000, 36(6): 527~528
  • 7[7]D Johnson, A Menezes, S Vanstone. The elliptic curve digital signature algorithm(ECDSA). 1999. http://www.certicom.com/pdfs/whitepapers/ecdsa.pdf
  • 8[8]D Brown. The exact security of ECDSA. Center for Applied Cryptographic Research, the University of Waterloo, Tech Rep: CORR 2000-54, 2000. http://www.cacr.math.uwaterloo.ca/

共引文献23

同被引文献46

引证文献7

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部