期刊文献+

多证明签名方案及在交叉认证中的应用 被引量:2

Multi-Certification Signature Scheme and Its Application to Cross-Certification
下载PDF
导出
摘要 自证明签名对验证者来说一次仅验证2个签名,而在交叉认证中验证证书链上的证书不止2个,因此,自证明签名在实际的应用中不能满足需求.针对此问题提出了多证明签名方案,它是在自证明签名的基础上做了一定的扩展,由验证2个签名扩展到可同时验证3个签名;此后又在多证明签名方案的基础上做了进一步的扩展,扩展后的多证明签名方案可同时验证n个签名. A verifier verifies only both signer's signature using self-certified signatures, but it verifies over two certifications to certification chain in cross-certification, it can't be satisfied with demand in actual application. To the above problem, a new digital signature scheme called multi-certification signature was proposed. The method extents self-certified signatures and verifies three certifications once and extents more multi-certification signature which can verifies multi-signatures once.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2006年第2期22-25,共4页 Journal of Beijing University of Posts and Telecommunications
基金 国家自然科学基金项目(60372094)
关键词 多证明签名 数字签名算法 公钥基础设施 交叉认证 multi-certification signature digital signature algorithm public key infrastructure crosscertification
  • 相关文献

参考文献8

  • 1Adams C,Lloyd S.Understanding pubkic-key infrastructure:concepts,standards and deployment considerations[M].[S.l.]:Macmillan Technical Publishing,1999.
  • 2Lee B,Kim K.Self-certified signature[C]∥Progress in Cryptology.Berlin:[s.n.],2002:199-214.
  • 3Girault M.Self-certified public keys[J].Proc of Conference on Information Security and Cryptology,1998,10(1):89-107.
  • 4Lee B,Kim K.PKI using self-certified key[J].Proc of Conference on Information Security and Cryptology 2000,10(1):65-73.
  • 5Schnorr C P.Efficient signatures generation by smart cord[J].Journal of Cryptology,1991,4(3):161-174.
  • 6谷利泽,李中献,杨义先.不需要可信任方的匿名代理签名方案[J].北京邮电大学学报,2005,28(1):48-50. 被引量:24
  • 7李梦东,杨义先,马春光,蔡满春.由群签名实现的可撤销匿名性的电子现金方案[J].北京邮电大学学报,2005,28(2):30-33. 被引量:7
  • 8GULi-ze ZHANGSheng YANGYi-xian.An Improved Proxy Multi-Signature Scheme[J].The Journal of China Universities of Posts and Telecommunications,2005,12(1):10-14. 被引量:1

二级参考文献33

  • 1ZHANGHong-xin,LUYing-hua,QIUYu-chun,CHENDa-qing.The Study of the Recognizability of Electromagnetic Leakage Information Arising from Computer[J].The Journal of China Universities of Posts and Telecommunications,2004,11(2):80-85. 被引量:5
  • 2Mambo M, Usuda K, Okamoto E. Proxy signature:delegation of the power to sign messages[A]. EICE Trans Fundamentals[C]. 1996. 1338-1353.
  • 3Lee B, Kim H, Kim K. Strong proxy signature and it's applications [A]. International Conference on Information and Communication Security, Proc of SCIS[C]. Japan, 2001. 603-608.
  • 4Kim S, Park S, Won D. Proxy signature, revisited[A]. International Conference on Information and Communication Security, Proc of ICICS[C]. Berlin,1997. 223-232.
  • 5Lee B, Kim H, Kim K. Secure mobile agent using strong non-designated proxy signature FA 1. Proc ACISP[C]. Spring-Verlag, 2001. LNCS 1 334, 474-486.
  • 6Shum K, Wei Victor K. A strong proxy signature scheme with proxy signer privacy protection [EB/OL]. http: // www. computer. org/proceedings/wetice/1748/17480055. pdf, 2002.
  • 7Boyd C. Comment :new digital signature scheme based discrete logarithm[J]. Electronics Letters, 1994, 30(6) : 480-481.
  • 8Jakabsson M, Yung M. Revocable and versatile electronic money [A]. Third ACM Conference on Computer and Communication Security [C]. India:1996.76-87.
  • 9Camenisch J, Maurer U, Stadler M. Digital payment systems with passive anonymity-revoking trustees[J].Journal of Computer Security, 1997,5 (1) : 254- 265.
  • 10Tsiounis Y, Yung M. Anonymity control in e-cash[A]. Proceedings of the 1st Financial Cryptography Conference (FC'97) [C]. Anguilla : BWI, 1997.24-28.

共引文献29

同被引文献18

  • 1李发根,胡予濮,李刚.一个高效的基于身份的签密方案[J].计算机学报,2006,29(9):1641-1647. 被引量:73
  • 2Sevinc P E, Strasser M, Basin D. Securing the distribution and storage of secrets with trusted platform modules [C]//WISTP07, LNCS 4462. Berlin : Springer-Verlag, 2007 : 53-66.
  • 3Boneh D, Lynn B, Shacham H, Short signatures from the well pairings [ C ] //Advances in Cryptology - Asiacrypt'01, LNCS2248. Berlin: Springer-Verlag, 2001: 514-532.
  • 4Girault M G. Self-certified public keys[C]//Advances in Cryptology(Proceedings of EuroCrypt' 91), LNCS 547. Berlin: Springer-Verlag, 1991: 490-497.
  • 5Shao Zuhua. Self-certified signature scheme from pairings [J]. The Journal of Systems & Software, 2007, 80(3) :388-395.
  • 6Yang Guomin, Wong Duncan, Deng Xiaotie. Analysis and improvement of a signcryption scheme with key privacy[ C]//ISC 2005, LNCS 3650. Berlin: Springer-Vetlag, 2005. 218-232.
  • 7Chik How Tan. Analysis of improved signcryption scheme with key privacy[J]. Information Processing Letters, 2006, 99(4): 135-138.
  • 8Chung Ki Li, Yang Guomin, Wong Duncan, et al. An efficient signcryption scheme with key privacy[C]//EuroPKI 2007, LNCS 4582. Berlin: Springer-Verlag, 2007: 78-93.
  • 9Li Fagen, Xin Xiangjun, Hu Yupu. A pairing-based signcryption scheme using self-certified public keys[J]. International Journal of Computers and Applications, 2007, 29(3): 278-282.
  • 10Sattam S Al-riyami, Kenneth G. Paterson and royal holloway, certifieateless public key cryptography[ C] //Asiacrypt 2003, LNCS 2894. Berlin: Springer-Verlag, 2003 : 452-473.

引证文献2

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部