期刊文献+

代理多重签名和指定接收人的代理多重签名方案

Proxy multi-signature and designated-receiver proxy multi-signature schemes
下载PDF
导出
摘要 设计了一种基于椭圆曲线离散对数问题(E lliptic Curre D iscrete Logarithm Problem,ECDLP)的代理多重签名方案,该方案不仅满足了代理多重签名的所有安全要求,而且避免了签名生成和签名验证过程中费时的求逆运算。在此方案的基础上提出了一种新的指定接收人的代理多重签名方案,并对其安全性进行了分析。 Proxy multi-signature scheme was first designed on ECDLP. This scheme can not only satisfy all the security requirements, but also avoid wasting time on inversion operations of its signature generation and verification. Then a new designated-receiver proxy signature scheme was proposed, and its security was analyzed.
出处 《计算机应用》 CSCD 北大核心 2006年第6期1346-1347,1350,共3页 journal of Computer Applications
关键词 椭圆曲线离散对数问题 代理多重签名 指定接收人签名 ECDLP proxy multi-signature scheme designated-receiver proxy signature scheme
  • 相关文献

参考文献5

二级参考文献23

  • 1祁明,肖国镇.基于Harn签名方案的远距离通行字认证方案[J].通信学报,1996,17(1):114-119. 被引量:27
  • 2[1]M.Mambo,K.Usuda,and E.Okamot.Proxy signatures:Delegation of the power to sign messages [J].IEICE Trans.Fundamentals,1996,E79-A(9):1338-1354.
  • 3[2]S.Kim,S.Park and D.Won proxy signatures,revisited [A].Proc.of ICICS'97,International Conference on Information and Communications Security [C],LNCE,1334,1997:223-232.
  • 4[3]K.Ohta and t.Okamoto.A digital multisignature scheme based on the Fiat-Shamir scheme [A].Advances in Cryptology—ASIACRYTP'91 [C]:.139-148.
  • 5DE S M, QUISQUATER J J, VEDDER K. A signature with shared verification scheme[A]. Advances in Cryptology-CRYPTO'89[C].Springer-Verlag, 1990. 253-262.
  • 6HARN L. Digital signature scheme with (t, n) shared verification based on discrete logarithms[J]. Electronics Letters, 1993, 29(24):2094-2095.
  • 7LEE W B, CHANG C C. Comment: digital signature scheme with (t, n) shared verification based on discrete logarithms[J].Electronics Letters, 1995, 31(3): 176-178.
  • 8HORSTER P, MICHELS M, PETERSON H. Comment: digital signature scheme with (t, n) shaxed verification based on discrete logarithms[J]. Electronics Letters, 1995, 31(14): 1137.
  • 9NYBERG K, RUEPPEL R. A message recovery for signature schemes based on discrete logarithm problem[A]. Advances in Ctyptology--Euroetypt'94[C]. Springer-Verlag, 1995.123-128.
  • 10SHAMIR A. Howto share a secret[J]. Communications of ACM, 1979, 24(11): 612-613.

共引文献92

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部