期刊文献+

A(k,n) Threshold Nominative Proxy Signature Scheme for Electronic Commerce 被引量:1

A(k,n) Threshold Nominative Proxy Signature Scheme for Electronic Commerce
下载PDF
导出
摘要 By using the Lagrange interpolation formula and the technology of signature of equality, a (k, n) threshold nominative proxy signature scheme is proposed, where an original signer delegates his (her) signing power to a proxy, who generates a nominative signature on behalf of the original signer and only k or more active verifiers in the n nominees (verifiers) nominated by the proxy signer can verify the signature signed by the proxy. If necessary, these (k or more) active nominees (verifiers) can prove its validity to a third party. In this scheme, the secret shares are generated and en- crypted by the original signer. At the same time, the ciphertexts of the secret shares are used as parts of the signature. Then, the secret shares need not be sent to the nominees (verifiers) secretly. The ordinary nominative proxy signature can be viewed as a (1, 1) threshold nominative proxy signature. The ordinary nominative proxy signature can be viewed as a special case of a (k, n) threshold nominative proxy signature. According to the security analysis of this paper, it is found that our scheme is secure against a proxy signing key forgery attack and existential forgery on an adaptive chosen message attack. By using the Lagrange interpolation formula and the technology of signature of equality, a (k, n) threshold nominative proxy signature scheme is proposed, where an original signer delegates his (her) signing power to a proxy, who generates a nominative signature on behalf of the original signer and only k or more active verifiers in the n nominees (verifiers) nominated by the proxy signer can verify the signature signed by the proxy. If necessary, these (k or more) active nominees (verifiers) can prove its validity to a third party. In this scheme, the secret shares are generated and encrypted by the original signer. At the same time, the ciphertexts of the secret shares are used as parts of the signature. Then, the secret shares need not be sent to the nominees (verifiers) secretly. The ordinary nominative proxy signature can be viewed as a (1, 1) threshold nominative proxy signature. The ordinary nominative proxy signature can be viewed as a special case of a (k, n) threshold nominative proxy signature. According to the security analysis of this paper, it is found that our scheme is secure against a proxy signing key forgery attack and existential forgery on an adaptive chosen message attack.
出处 《Journal of China University of Mining and Technology》 EI 2006年第4期470-474,共5页 中国矿业大学学报(英文版)
基金 Projects 60473028 supported by the National Natural Science Foundation of China and 2006XXJ17 by the Natural Science Foundation of Zhengzhou Universityof Light Industry
关键词 电子商务 密码 数字签名 有效性 digital signature nominative signature proxy signature
  • 相关文献

参考文献7

  • 1Dai J Z,Yang X H,Dong J X.Designated-receiver proxy signature scheme for electronic commerce[].Proceedings of IEEE International Conference on Systems Man and Cybernetics-SMC.2003
  • 2Wu J H,Wu Q H.An improved nominative proxy signature for mobile communication[].IEICE Transactions on Information and Systems.2005
  • 3Kim S J,Park S J,Won D H.Nominative signatures[].Proceedings of the International Conference on Elec- tronics Information and Communication-ICEIC ‘.1995
  • 4Diffie W,,Hellman M.New directions in cryptography[].IEEE Transactions on Information Theory.1976
  • 5Camenisch J.Grou Signature Schemes and Payment Systems Based on the Discrete Logarithm Problem[]..1998
  • 6Kim S J,Park S J,Won D H.Zero-knowledge nominative signatures[].Proceedings of PragoCrypt International Con- ference on the Theory and Applications of Cryptology.1996
  • 7Seo S H,Lee S H.New nominative proxy signature scheme for mobile communication[].Proceedings of International Con- ference in Security and Protection of Information-SPI.2003

同被引文献6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部