期刊文献+

已知签名人的门限代理签名方案 被引量:4

A Threshold Proxy Signature Scheme with Actual Signers
下载PDF
导出
摘要 在将典型代理签名方案的授权方式加以改进的基础上,通过引入代理群管理员来分发秘密份额,提出了一个已知签名人的门限代理签名方案.该方案避免了签名的滥用,具有能辨识真正签名人的不可否认性质,抵抗合谋攻击. Based on improvement of authentication method of typical proxy signature scheme, the secret share was distributed by a proxy group administrator. A threshold proxy signature scheme with known signers was proposed. The scheme has the non-repudiation property. The non-repudiation property provides the scheme the ability to identify the actual signers of the proxy signature, and then to avoid the abuse of signatures. Furthermore, the proposed scheme can withstand conspiracy attack.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2006年第4期103-106,共4页 Journal of Beijing University of Posts and Telecommunications
基金 国家自然科学基金项目(60373026) 山东省自然科学基金项目(Y2003G02)
关键词 代理签名 合谋攻击 不可否认性 proxy signature conspiracy attack non-repudiation
  • 相关文献

参考文献18

  • 1Mambo M, Usuda K, Okamoto E. Proxy signature: delegation of the power to sign messages[J]. IEICE Trans Fundamentals, 1996, E79-A (9): 1338-1353.
  • 2Mambo M, Usuda K, Okamoto E. Proxy signatures for delegating signing operation[C] // Proc 3rd ACM Conference on Computer and Communications Security. New York: ACM Press, 1996: 48-57.
  • 3Kim S, Park S, Won D. Proxy signature, revisited[C]// International Conference on Information and Communication Security. [S.l.]: Springer-Verlag, 1997: 223-232.
  • 4Lee B, Kim H, Kim K. Strong proxy signature and its application [C] // Proc of ACISP 2001. Japan: [s. n.], 2001: 603-608.
  • 5Lee B, Kim H, Kim K. Secure mobile agent using strong non-designated proxy signature [C] // Proc of ACISP 2001. London: Springer-Verlag, 2001: 474-486.
  • 6邱慧敏,杨义先,胡正名,周锡增.一种基于ElGamal数字签名的双向用户鉴别方案[J].北京邮电大学学报,2005,28(3):100-102. 被引量:9
  • 7Kim H, Baek J, Lee B, et al. Computing with secrets for mobile agent using one-time proxy signature [C] // ACISP 2001. Japan: [s.n.], 2001: 845-850.
  • 8Tzeng S F, Hwang M S, Yang C Y. An improvement of nonrepudiable threshold proxy signature scheme with known signers[J]. Computer Security, 2004 (23) : 174-178.
  • 9Petersen H, Horster P. Self-certified keys-concepts and applications[C] // Proc of 3rd Conference on Communications and Multimedia Security. [S. l.] : Chapman & Hall, 1997: 102-116.
  • 10谷利泽,李中献,杨义先.不需要可信任方的匿名代理签名方案[J].北京邮电大学学报,2005,28(1):48-50. 被引量:24

二级参考文献17

  • 1周智,胡正名.用户验证方案设计[J].北京邮电大学学报,1996,19(1):86-90. 被引量:2
  • 2[1]M.Mambo,K.Usuda,and E.Okamot.Proxy signatures:Delegation of the power to sign messages [J].IEICE Trans.Fundamentals,1996,E79-A(9):1338-1354.
  • 3[2]S.Kim,S.Park and D.Won proxy signatures,revisited [A].Proc.of ICICS'97,International Conference on Information and Communications Security [C],LNCE,1334,1997:223-232.
  • 4[3]K.Ohta and t.Okamoto.A digital multisignature scheme based on the Fiat-Shamir scheme [A].Advances in Cryptology—ASIACRYTP'91 [C]:.139-148.
  • 5Mambo M, Usuda K, Okamoto E. Proxy signature:delegation of the power to sign messages[A]. EICE Trans Fundamentals[C]. 1996. 1338-1353.
  • 6Lee B, Kim H, Kim K. Strong proxy signature and it's applications [A]. International Conference on Information and Communication Security, Proc of SCIS[C]. Japan, 2001. 603-608.
  • 7Kim S, Park S, Won D. Proxy signature, revisited[A]. International Conference on Information and Communication Security, Proc of ICICS[C]. Berlin,1997. 223-232.
  • 8Lee B, Kim H, Kim K. Secure mobile agent using strong non-designated proxy signature FA 1. Proc ACISP[C]. Spring-Verlag, 2001. LNCS 1 334, 474-486.
  • 9Shum K, Wei Victor K. A strong proxy signature scheme with proxy signer privacy protection [EB/OL]. http: // www. computer. org/proceedings/wetice/1748/17480055. pdf, 2002.
  • 10Boyd C. Comment :new digital signature scheme based discrete logarithm[J]. Electronics Letters, 1994, 30(6) : 480-481.

共引文献99

同被引文献20

  • 1张忠,徐秋亮.具有已知签名人的不可否认门限代理签名方案[J].计算机应用研究,2006,23(2):111-112. 被引量:1
  • 2王晓明,张震,符方伟.一个安全的门限代理签名方案[J].电子与信息学报,2006,28(7):1308-1311. 被引量:7
  • 3蒋瀚,徐秋亮,周永彬.基于RSA密码体制的门限代理签名[J].计算机学报,2007,30(2):241-247. 被引量:13
  • 4刘昌远,徐秋亮.一个已知签名人的门限代理签名方案的改进[J].计算机工程,2007,33(12):175-177. 被引量:4
  • 5Mambo M,Usuda K, Okamoto E.Proxy signature for delegating signing operation[C]//Proceedings of ,the 3rd ACM Conference on Computer and Communications Security, New Delhi, 1996: 48-57.
  • 6Kim S;Park S,Won D.Proxy signatures[C]//Okamoto T,Qing S. LNCS 1334: Information and Communications Security.Berlin: Springer-Verlag, 1997: 223-232.
  • 7Zhang K.Threshold proxy signature schemes[C]//Okamoto E,Davida G, Mambo M.Proceeding of the Information Security.Berlin: Springer-Verlag, 1998:191-197.
  • 8Sun H M,Lee N Y,Hwang T.Threshold proxy signatures[J].IEE Proceedings Computers and Digital Technique, 1999, 146 (5) 259-263.
  • 9Hwang M S, Lin I C,Lu E J L.A secure nonrepudiable threshold proxy signature scheme with known signers[J].Intemational Journal of Informatica,2000,11(2) : 1-8.
  • 10Hwang M S,Lu E J L, Lin I C.A praetical(t,n) threshold proxy signature scheme based on the RSA cryptosystem[J]. IEEE Transactions on Knowledge and Data Engineering,2003, 15(6) : 1552-1560.

引证文献4

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部