期刊文献+

对可撤销匿名性的盲代理签名方案的分析 被引量:2

Cryptananlysis of an Anonymity-revoking Blind Proxy Signature Scheme
下载PDF
导出
摘要 王晓明等在2003年提出了一个盲代理签名方案,使原始签名人不能直接根据代理签名辨认出代理签名人的身份,但在需要时,可以通过代理签名管理中心来辨认出代理签名人的身份.本文通过描述一个有效的攻击来指出他们方案中的一些安全漏洞.该攻击能够伪造出有效的代理签名,使签名验证人可以接受该代理签名,但管理中心并不能通过此签名来辨认出代理签名人的身份. Wang et al proposed a digital blind proxy signature scheme in 2003. The properties of the scheme are that the original signer can not identify the proxy signer through a proxy signature and the proxy signer can blindly sign a message, but when it's necessary, the anonymity can be revoked by a proxy signature management center. In this paper we will point out some of the security flaws of their scheme by presenting an effective attack. One can forge an effective proxy signature that will be accepted by the signature verifier and that will not identify the true signer to management.
出处 《中国科学院研究生院学报》 CAS CSCD 2006年第6期833-836,共4页 Journal of the Graduate School of the Chinese Academy of Sciences
关键词 盲代理签名 可撤销匿名性 密码分析 blind proxy signature, anonymity-revoking, cryptanalysis
  • 相关文献

参考文献1

二级参考文献4

  • 1[1]Mambo M, Usuda K, Okamoto E. Proxy signature: Delegation to sign messages. IEICE Transactions on Fundamentals, 1996,E79-A (9): 1338~1354
  • 2[2]Kim S, Park S, Won D. Proxy signatures, revisited. In: Lecture Notes in Computer Science 1334, Berlin: Springer-Verlag, 1997, 1334:223~232
  • 3[3]Zhang K. Threshold proxy signature scheme. In:Proceedings of Information Security Workshop, Japan, 1977. 101 ~ 109
  • 4[4]Yi L J, Bai G Q, Xiao G Z. Proxy multi-signature scheme: A new type of proxy signature scherne. Electronics Letters, 2000,36(6) :527~528

共引文献22

同被引文献21

  • 1傅晓彤,杨礼珍,肖国镇.对可撤销匿名性的盲代理签名方案的注记[J].计算机学报,2005,28(8):1404-1406. 被引量:9
  • 2曹正军,刘木兰.一个盲代理签名方案的安全性分析[J].中国科学院研究生院学报,2006,23(2):145-148. 被引量:4
  • 3康莉,蔡勉,王亚军.基于Nyberg-Rueppel签名体制的盲代理多重签名方案[J].通信学报,2007,28(3):115-119. 被引量:12
  • 4YI L J,XIAO G Z.Blind proxy signature scheme[C].Proceedings of CCICS'2001.Beijing:Science Press,2001:88-95.
  • 5STADLER M,PIVENTEAU J M,CAMENISCH J.Fair blind signatures[C].Advances in Cryptology-Eurocrypt '95.Springer-Verlag,1995:209-219.
  • 6CUNTHER C.An identity-based key-exchange protocol[C].Lecture Notes in Computer Science,1989:29-37.
  • 7TSENG Y M.A communication-efficient and fault-tolerant conference-key agreement protocol with forward secrecy[J].The Journal of Systems and Software,2007,80:1 091-1 101.
  • 8RAPHAEL C W.Cryptanalysis of e-mail protocols providing perfect forward secrecy[J].Computer Standards & Interfaces,2008,30:101-105.
  • 9ADNERSON R.Two remarks on public key cryptology[C].Invited lecture.In:Fourth Annual Conference on Computer and CommunicationsSecurity,ACM,1997.
  • 10BELLARE M,MINER S.A forward-secure digital signature scheme[C].Cryptology CRYPTO'99,Lecture Notes in Computer Science.Springer Verlag,1999:431-448.

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部