期刊文献+

一个可追踪的匿名性签名方案 被引量:1

A Traceable Scheme for Anonymous Signature
下载PDF
导出
摘要 在D.Chaum建立的电子钱包的匿名性签名方案的基础上,针对D.Chaum的方案中存在的对犯罪嫌疑人不可追踪这一问题,提出了一个对犯罪嫌疑人可追踪的匿名性签名方案,即对于犯罪嫌疑人的合法签名,可以通过一个公正的第三方(如法院),找到这个用户的身份号(ID),从而完成对该ID的跟踪.与D.Chaum建立的电子钱包的匿名性方案相比,该方案在现实生活中更加具有实用性和有效性. Based on the anonymous signature scheme of electronic wallet, as designed by D. Chaum, a traceable signature scheme for illegal user is presented to solve the problem that the illegal user is untraceable, i.e. , a trusted third party such as the court can find the identity or ID number of the illegal user by his legal signature and, consequently, accomplish the ID tracing. Compared with the original ,scheme designed by D. Chaum, the new one is more practical and useful in actuality.
作者 张祥德 徐明
出处 《东北大学学报(自然科学版)》 EI CAS CSCD 北大核心 2006年第9期965-967,共3页 Journal of Northeastern University(Natural Science)
基金 辽宁省科学技术基金资助项目(002010)
关键词 电子钱包 匿名性签名 可追踪 公钥 身份号 Key words: electronic wallet anonymous signature traceable public key identity
  • 相关文献

参考文献10

  • 1Chaum D,Pedersen T.Wallet databases with observers[A].Advances in Cryptology -CRYPTO'92,LNCS 740[C].Santa Barbara:Springer-Verlag,1993.89-105.
  • 2Brands S.Untraceable off-line cash in wallets with observers[A].Advances in Cryptology -CRYPTO'93,LNCS 773[C].Santa Barbara:Springer-Verlag,1994.302-318.
  • 3Solages A D,Traore J.Electronic cash system with extensions to checks and wallets with observers[A].FC'98,LNCS 1465[C].Anguilla:Springer-Verlag,1998.275-295.
  • 4Yacobi Y.Efficient electronic money[A].Advances in Cryptology -ASIACRYPT'94,LNCS 917[C].Wollongong:Springer-Verlag,1994.153-163.
  • 5Abe M,Fujisaki E.How to date blind signature[A].Advances in Cryptology-ASACRYPT'96,LNCS 1163[C].Kyongju:Springer-Verlag,1996.244-251.
  • 6张祥德,朱和贵,丁春燕.基于Weierstrass函数的随机数发生器[J].东北大学学报(自然科学版),2006,27(8):863-866. 被引量:3
  • 7Itkis G,Reyzin L.Forward-secure signatures with optimal signing and verifying[A].Advances in Cryptology -CRYPTO'01,LNCS 2139[C].Santa Barbara:Springer-Verlag,2001.332-354.
  • 8Bellare M,Miner S K.A forward-secure digital signature scheme[A].Advances in Cryptology -CRYPTO'99,LNCS 1666[C].Santa Barbara:Springer-Verlag,1998.431-448.
  • 9Pointcheval D,Stem J.Provably secure blind signatures schemes[A].Advances in Cryptology -ASIACRYPT'96,LNCS 1163[C].Kyongju:Springer-Verlag,1998.123-128.
  • 10杨波,刘胜利,王育民.利用Smart卡的可撤销匿名性的电子支付系统[J].电子学报,1999,27(10):83-86. 被引量:8

二级参考文献9

  • 1蒋本铁,刘嘉辉,徐彬.一种基于混沌和Fibonacci伪随机数列的加密方法[J].东北大学学报(自然科学版),2005,26(9):864-866. 被引量:10
  • 2Matteis A D,Pagnutti S.Long-range correlation in linear and nonlinear random number generation[J].Parallel Computing,1990,14:207-210.
  • 3Ferrenberg A M,Landau D P,Wong Y J.Monte Carlo simulations:hidden errors from good random number generators[J].Physical Review Letters,1992,69(23):3382-3384.
  • 4Schmitz R.Use of chaotic dynamical systems in cryptography[J].Journal of the Franklin Institute,2001,338:429-441.
  • 5Peyravian M,Matyas S M.Generating user-based cryptographic keys and random numbers[J].Computers & Security,1999,18(7):619-626.
  • 6Hellekalek P.Good random number generators are (not so) easy to find[J].Mathematics and Computers in Simulation,1998,46:485-505.
  • 7Gonzalez J A,Pino R.Chaotic and stochastic functions[J].Physica A,2000,276:425-440.
  • 8Gonzalez J A,Reyes L I,Suarez J J.Chaos-induced true randomness[J].Physica A,2002,316:259-288.
  • 9薛英花,吕述望,郭圣权.随机数发生器分析及其在安全信息系统中的应用[J].计算机工程,2003,29(3):42-44. 被引量:18

共引文献9

同被引文献20

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部