期刊文献+

一个证实数字签名方案安全性的研究

RESEARCH ON SECURITY OF A CONFIRMER SIGNATURE SCHEME
下载PDF
导出
摘要 对于一个证实数字签名,要确认其有效性,必须由第三方证实者来完成。针对一个基于DSA和RSA的证实数字签名方案所存在的安全缺陷进行了研究,提出了改进的确认与否认协议,从而使该方案真正成为安全和高效的方案。 Determining the validity of a confirmer signature must be performed by a designated confirmer. After researching on the disfigurement of security in a confirmer signature scheme based on DSA and RSA,this paper puts forward an improved protocol of confirmation and disavowal. And the protocol makes the scheme secure and high efficienct.
作者 林福伙
出处 《计算机应用与软件》 CSCD 北大核心 2006年第7期124-126,共3页 Computer Applications and Software
关键词 证实数字签名 数字签名 信息安全 Confirmer signature Digital signature Information security
  • 相关文献

参考文献6

  • 1Chaum D,Designated confirmer signatures.In:Proc.of the Advances in Cryptography-EUROCRYPT′94.LNCS950,Berlin:Springer-Verlag,1994,86~89.
  • 2Michels M,Stadler M,Generic constructions for secure and efficient confirmer signature schemes.In:Proc.of the Advances in Cryptography-EUROCRYPT′98.LNCS 1403,Berlin:Springer-Verlag,1998,406~421.
  • 3Camenisch J,Michels M,Confirmer signature schemes secure against adaptive adversaries(extended abstract).In:Proc.of the Advances in Cryptography-EUROCRYPT 2000.LNCS 1807,Berlin:Springer-Verlag,2000,243~258.
  • 4王尚平,王育民,张亚玲.基于DSA及RSA的证实数字签名方案[J].软件学报,2003,14(3):588-593. 被引量:43
  • 5王贵林,卿斯汉.一个证实数字签名方案的安全缺陷[J].软件学报,2004,15(5):752-756. 被引量:18
  • 6Jakobsson M,Sako K,Impagliazzo R,Designated Verifer proofs and their applications.In:Proc.of the Advances in Cryptography-EUROCRYPT′96.LNCS 1070,Berlin:Springer-Verlag,1996,143~154.

二级参考文献10

  • 1[1]Chaum D, van Antwerpen H. Undeniable signatures. In: Brassard G, ed. Proceedings of the Advances in Cryptology (CRYPTO'89). LNCS 435, Berlin: Springer-Verlag, 1990. 212~216.
  • 2[2]Chaum D. Designated confirmer signatures. In: De Santis A, ed. Proceedings of the Advances in Cryptology (EUROCRYPT'94). LNCS 950, Berlin: Springer-Verlag, 1994. 86~89.
  • 3[3]Okamoto T. Designated confirmer signatures and public-key encryption are equivalent. In: Desmendt YG, ed. Proceedings of the Advances in Cryptology (CRYPTO'94). LNCS 839, Berlin: Springer-Verlag, 1994. 61~74.
  • 4[4]Michels M, Stadler M. Generic constructions for secure and efficient confirmer signature schemes. In: Nyberg K, ed. Proceedings of the Advances in Cryptology (EUROCRYPT'98). LNCS 1403, Berlin: Springer-Verlag, 1998. 406~412.
  • 5[5]Camenisch J, Michels M. Confirmer signature secure against adaptive adversaries. In: Preneel B, ed. Proceedings of the Advances in Cryptology (EUROCRYPT 2000). LNCS 1807, Berlin: Springer-Verlag, 2000. 243~258.
  • 6[6]Rivest R, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 1978,21(2):120~126.
  • 7[7]Cramer R, Shoup V. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk H, ed. Proceedings of the Advances in Cryptology (CRYPTO'98). LNCS 1462, Berlin: Springer-Verlag, 1998. 13~25.
  • 8[8]National Institute of Standards and Technology. Digital signature standard. NIST FIPS PUB 186, Department of Commerce, NIST, 1994.
  • 9[9]National Institute of Standards and Technology. Secure hash standard. NIST FIPS PUB 180-1, Washington D.C.: Department of Commerce, NIST, 1995. http://csrc.nist.gov/cryptval/shs.html.
  • 10王尚平,王育民,张亚玲.基于DSA及RSA的证实数字签名方案[J].软件学报,2003,14(3):588-593. 被引量:43

共引文献47

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部