期刊文献+

对一种门限代理签名方案的密码分析及改进 被引量:4

Cryptanalysis and improvement of a threshold proxy signature scheme
下载PDF
导出
摘要 对一种基于双线性对的新型门限代理签名方案进行了密码分析,发现该门限代理签名方案不能抵抗伪造攻击和公钥替换攻击。对该方案进行了改进,改进后的门限代理签名方案克服了原门限代理签名方案的安全隐患,并且保留了原门限代理签名方案的优点。 Through the cryptanalysis of a threshold proxy signature scheme based on bilinear pairings, it was found that the scheme couldn't resist forgery attack and public-key substitute attack. An improvement to mend the security leaks was proposed, which overcame the disadvantages and retained the merits of the original threshold proxy signature scheme.
出处 《计算机应用》 CSCD 北大核心 2006年第7期1631-1633,共3页 journal of Computer Applications
基金 国家自然科学基金资助项目(10271069) 河南省自然科学基金资助项目(0511010300)
关键词 双线性对 门限代理签名 伪造攻击 公钥替换攻击 bilinear pairings threshold proxy signature forgery attack public-key substitute attack
  • 相关文献

参考文献7

  • 1MAMBO M, USUDA K, OKAMOTO E. Proxy signatures for delegating signing operation[ A]. Proceedings of the 3rd ACM Conference on Computer and Communications Security[ C]. New Dehi, India:ACM Press, 1996.48 -57.
  • 2MAMBO M, USUDA K, OKAMOTO E. Proxy signatures: delegation of the power to sign messages[J]. IEICE Transactions Fundamentals, 1996, E79A(9):1338 -1354.
  • 3ZHANG K. Threshold proxy signature schemes[ A]. Proceedings of the First International Workshop on Information Security[ C]. Berlin: Springer-Verlag, 1997. 191 - 197.
  • 4KIM S, PARK S, WON D. Proxy signatures, revisited[A]. Proceedings of International Conference on Information and Communications Security[ C]. Berlin: Springer-Verlag, 1997. LNCS1334, 223- 232.
  • 5SUM HM, LEE NY, HWANG T. Threshold proxy signatures[J].IEE Proceedings of Computers & Digital Techniques, 1999, 146(5) : 259 -263.
  • 6李继国,曹珍富.一个门限代理签名方案的改进[J].计算机研究与发展,2002,39(11):1513-1518. 被引量:26
  • 7钱海峰,曹珍富,薛庆水.基于双线性对的新型门限代理签名方案[J].中国科学(E辑),2004,34(6):711-720. 被引量:22

二级参考文献36

  • 1[1]Cao Zhenfu. The multi-dimension RSA and its low exponent security. Science in China, Ser E, 2000,43(4): 349~354
  • 2[2]Boneh D, Lynn B, Shacham H. Short signatures from the Weil pairing. In: Advances in Cryptology-Asiacrypt'01, LNCS 2248. Berlin: Springer-Verlag, 2001. 514~532
  • 3[3]Boldyreva A. Threshold Signature, Multisignature and Blind Signature Schemes Based on the Gap-Diffe-Hellman-group Signature Scheme. In: Public Key Cryptograpy-PKC 2003, LNCS 2567. Berlin: Springer-Verlag, 2003. 31~46
  • 4[4]Mambo M, Usuda K, Okamoto E. Proxy signature: Delegation of the power to sign messages. IEICE Trans Fundam, 1996, E79-A(9): 1338~1354
  • 5[5]Mambo M, Usuda K, Okamoto E. Proxy signature for delegating signing operation. In: Proc 3rd ACM Conference on Computer and Communications Security, New Dehli, India. New York: ACM Press, 1996.48~57.
  • 6[6]Neuman B C. Proxy-based authorization and accounting for distrubuted systems. In: Proc 13th International Conference on Distrubuted Systems, 1993. 283~291
  • 7[7]Zhang Fangguo, Kim Kwangjo. Threshold proxy signature schemes. 1977 Information Security Workshop, Japan, Sep. 1977. 191~197
  • 8[8]Zhang Fangguo, Kim Kwangjo. Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Parings. In: Proc of ACISP'03, July 9-11, Wollongong, Australia, LNCS 2727. Berlin: Springer-Verlag,2003. 312~323
  • 9[9]Sun H-M, Lee N-Y, Hwang T. Threshold proxy signatures. IEE Proc-Computers & Digital Techniques,1999, 146(5): 259~263
  • 10[10]Joux A, Nguyen K. Separating Decision Diffe-Hellman from Diffe-Hellman in Cryptographic Groups.Cryptology ePrint Archive-2001/03

共引文献45

同被引文献42

  • 1刘锋,张建中.可公开验证的秘密分享机制[J].兰州大学学报(自然科学版),2006,42(2):65-67. 被引量:9
  • 2祁传达,李亚梅,金晨辉.门限代理签名方案的安全性分析[J].计算机工程与设计,2006,27(10):1767-1768. 被引量:4
  • 3张忠,徐秋亮.一种高效的不可否认门限代理签名方案的分析及改进[J].计算机工程与科学,2006,28(9):7-8. 被引量:2
  • 4王天银,蔡晓秋,张建中.一种安全有效的代理盲签名方案[J].计算机工程,2007,33(2):148-149. 被引量:6
  • 5MAMBO M, USUDA K, OKAMOTO E. Proxy signature: delegation of the power to sign messages [J]. IEICE Trans Fundamentals, 1996, E79-A (9) : 133-135.
  • 6CHAUM D. Blind signature for untraceable payments[C]. Advances in Cryptology Crypto'82, 1982 : 199-203.
  • 7YANG Cheng-ying, TZENG Shiang-feng, HWANG Min-shiang. On the efficiency of nonrepudiable threshold proxy signature scheme with known signers[J]. Systems and Software, 2004, 73(3): 507-514.
  • 8KIM S, PARK S, WON D. Proxy signatures, Revisited[C]. ICICS'97, LNCS1334, 1997: 223-232.
  • 9ZHANG K. Threshold proxy signature schemes [C]. Japan: 1997 Information Security Workshop, 1997: 191-197.
  • 10Sun H M. An efficient nonrepudiable threshold proxy signature scheme with known signers [J]. Computer Communications, 1999, 22 (8): 717- 722.

引证文献4

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部