期刊文献+

一个保护隐私的代理签名方案的安全性分析 被引量:1

Security analyze of privacy-protecting proxy signature scheme
下载PDF
导出
摘要 在一个代理签名方案中,原始签名人授权代理签名人,代理签名人代表原始签名人生成有效的代理签名。在某些应用中,原始签名人可能希望代理签名人在不知道消息内容的情况下代表自己产生有效的签名。最近Dai等人提出了保护隐私的代理签名方案,但是Dai等人的方案不能抵抗伪造攻击,同时他们的方案不能满足上述安全要求。 In a proxy signature scheme, a designated proxy signer can generate valid proxy signatures on behalf of the original signer. In some applications, the original signer may hope that the proxy signer can sign on behalf of him without knowing the content of the signed message. Recently, Dai proposed a privacy-protecting proxy signature scheme, however, Dai's scheme cannot withstand forgery attack, and the scheme also cannot fulfill the claimed security requirements.
出处 《计算机工程与设计》 CSCD 北大核心 2006年第23期4419-4420,共2页 Computer Engineering and Design
基金 国家自然科学基金项目(60373026) 山东省自然科学基金项目(Y2003G02)
关键词 保护隐私 伪造攻击 代理签名 授权 签名 privacy-protection forgery atlack proxy signature designate signature
  • 相关文献

参考文献10

  • 1Mambo M,Usuda K,Okamoto E.Proxy signature:Delegation of the power to sign messages[J].IEICE Trans Fundamentals,1996,E79-A(9):1338-1353.
  • 2Mambo M,Usuda K,Okamoto E.Proxy signatures for delegating signing operation[C].Proceeding 3rd ACM Conference on Computer and Communications Security,ACM press,1996.48-57.
  • 3Kim S,Park S,Won D.Proxy signature,revisited[C].Proc of International Conference on Information and Communication Security,1997.223-232.
  • 4Zhang K.Threshold proxy signature schemes[C].Japan:Information Security Workshop,1997.191-197.
  • 5Lee B,Kim H,Kim K.Strong proxy signature and its applications[C].Proc of SCIS,2001.603-608.
  • 6Dai Jia-Zhu,Yang Xiao-Hu,Dong Jin-Xiang.A privacy-protecting proxy signature scheme and its application[C].ACMSE,2004.203-206.
  • 7Cham D.Blind signature systems[C].New York:Proceedings of Crypto'83,Springer-Verlag,1998.153-156.
  • 8ELGamal T.A public-key cryptosystem and signature scheme based on discrete logarithms[J].IEEE Trans Info Theory,1985,31(4):469-472.
  • 9Shum K,Wei V K.A strong proxy signature scheme with proxy signer privacy protection[C].Pittsburgh,PA,USA:Proceedings of the Eleventh IEEE International Workshop on Enabling Technologies:Infrastructure for Collaborative Enterprises,2002.55-56.
  • 10Fu Xiao-tong,Kou Wei-dong,Xiao Guo-zhen.A proxy signature scheme with proxy signer's privacy anonymity[C].Proceedings of the IEEE international on E-Commerce Technology for Dynamic E-Business,2004.

同被引文献7

  • 1谢琪,于秀源.基于ID的一次性盲公钥的密码学分析[J].浙江大学学报(理学版),2005,32(6):644-645. 被引量:6
  • 2洪帆,杨巍.基于SPKI的电子支付系统[J].计算机工程与科学,2006,28(8):24-25. 被引量:2
  • 3庞辽军,李恕海,王育民.一个公平有效的电子支付协议[J].计算机工程,2006,32(22):34-36. 被引量:1
  • 4George Yee,Larry Korba.Privacy policy compliance for web services[C].Proceedings of the IEEE International Conference on Web Services.San Diego,California,USA:IEEE Computer Society Press,2004:158-165.
  • 5Matthias Enzmann,Markus Schneider.A privacy-friendly loyalty system for electronic marketplaces[C].Proceedings of the IEEE International Conference on E-Technology,E-Commerce and E-Service.Taipei,Taiwan:IEEE Computer Society,2004:385-393.
  • 6Jung Min Park,Edwin K P Chong,Howard Jay Siegel.Constructing fair-exchange protocols for E-commerce via distributed computation of RSA signatures[C].Proceedings of the Twenty-Second Annual Symposium on Principles of Distributed Computing.Boston,Massachusetts:ACM Press,2003:172-181.
  • 7张秋璞,郭宝安.基于ID的一次性盲公钥[J].电子学报,2003,31(5):769-771. 被引量:15

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部