期刊文献+

一种防抵赖的多级代理签名方案 被引量:7

Undeniable Multiple Grade Proxy Signature Scheme
下载PDF
导出
摘要 为了解决原始签名人和代理签名人之间的诸多抵赖问题,实现安全有效代理,基于离散对数提出了一种多级代理签名方案.把最终代理签名人的私钥嵌入最终的代理签名密钥中,使原始签名人和代理签名人都不能单独生成一个有效的多级代理签名,实现了一种防原始签名人和代理签名人互相抵赖的多级代理签名方案,与现有其他方案相比,其安全性得到了明显提高. The denial between the original signer and the proxy signers is a serious problem in multiple grade proxy signature scheme. In order to solve this problem, an undeniable multiple grade proxy signature scheme is proposed based on the study of the discrete logarithm. This scheme puts a private key of the last proxy signer into the final proxy-signing key to ensure that none of the signers can deny their signatures, because the original signer and the proxy signer can't produce an effective multiple grade proxy signature by themselves. Therefore, they are both responsible for the signatures. As a result, compared to other schemes, a more secure multiple grade proxy signature is achieved with this solution.
作者 蔡勉 康莉
出处 《北京工业大学学报》 EI CAS CSCD 北大核心 2006年第10期953-957,共5页 Journal of Beijing University of Technology
关键词 数据安全 公钥密码体制 计算复杂度 电子政务 电子商务 代理签名 防抵赖 security of data public key cryptoqraphy computational complexity e-government e-commerce proxy signature undeniable
  • 相关文献

参考文献4

  • 1MAMBO M,USUDA K,OKAMATO E.Proxy signature:delegation of the power to sign messages[J].IEICE Trans Fundamentals,1996,E79-A(9):1338-1353.
  • 2谭作文,刘卓军.一个前向安全的强代理签名方案[J].信息与电子工程,2003,1(4):257-259. 被引量:18
  • 3SHAO Zu-hua.Proxy signature schemes based on factoring[J].Information Processing Letter,2003,85:137-143.
  • 4MAMBO M,OKAMOTO E.Proxy cryptosystems:delegation of the power to decrypt ciphertexts[J].IEICE Trans Fundamentals,1997,E80-A(1):54-63.

二级参考文献11

  • 1[1]Ross Anderson.Two remarks on public key cryptology. Invited Lecture [A].The fourth ACM Computer and Communication Security [C],1997.
  • 2[2]A Fiat,A Shamir.How to prove yourself:practical solutions to identification and signature problems [A].Advances in Cryptology-Crypto'86, Lecture Notes of Computer Science [C],1986,1987: 186-194.
  • 3[3]M Bellare,S K Miner. A forward-secure digital signature scheme [A]. Advances in Cryptology-Crypto'99, Lecture Notes of Computer Science [C],1999, 1666: 431-448.
  • 4[4]M Abdalla,L Reyzin. A new forward-secure digital signature scheme [A]. Asiacrypt'00, Lecture Notes of Computer Science [C], 2000,1976:116-129.
  • 5[5]L C Guillou, J J Quisquater. A "paradoxical" identity-based signature scheme resulting from zero-knowledge [A]. Advances in Cryptology-Crypto'88, Lecture Notes of Computer Science [C],1988, 403: 216-231.
  • 6[6]G Itkis,L Reyzin. Forward-secure signatures with optimal signing and verifying [A]. Advances in Cryptology-Crypto'01, Lecture Notes of Computer Science [C],2001, 2139:332-354.
  • 7[7]M Mambo,K Usuda,E Okamato. Proxy signature: Delegation of the power to sign messages [A]. IEICE Trans. Fundamentals [C],1996, E79-A: 1338-1353.
  • 8[8]Zuhua Shao. Proxy signature schemes based on factoring [A]. Information Processing Letter [J], 2003, 85: 137-143.
  • 9[9]B Lee, H Kim, K Kim. Strong proxy signature and its applications [A]. SCI2001 [C],2001, 2: 603-608.
  • 10[10]J Y Lee, J H Cheon, S Kim. An analysis of proxy signatures: Is a secure channel necessary? [A]. CT-RST 2003 [C],2003, 2612: 68-79.

共引文献17

同被引文献42

引证文献7

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部