期刊文献+

对一种代理多重签名的安全分析 被引量:2

Security argument of a proxy multi-signature scheme
下载PDF
导出
摘要 Zhou等人提出一种强代理多重签名方案,并声称该方案具有强不可伪造性和不可否认性.通过对Zhou的方案进行安全分析,指出该方案具有伪造性和否认性,并给出相应的攻击方法.通过对签名中R表示形式的限定给出两种改进方法来阻止相应的攻击. Zhou et al proposed a proxy multi-signature scheme and claimed that the scheme was non-deniable and unforgeable. Unfortunately, in this work, security analysis was given to the scheme and results showed that the scheme was forgeable and repudiative. Finally, the investigator gave the corresponding attacks to the scheme and two corresponding improved methods to the original scheme to overcome the attacks by fixing R representation format.
出处 《哈尔滨工业大学学报》 EI CAS CSCD 北大核心 2006年第11期1874-1875,1880,共3页 Journal of Harbin Institute of Technology
基金 国家重点基础研究发展规划资助项目(2002CB312104)
关键词 代理多重签名 安全分析 伪造性 不可否认性 proxy multi-signature security analysis forgeable non-repudiation
  • 相关文献

参考文献4

二级参考文献19

  • 1[1]Mambo M, UsudaK, OkamotoE. Proxy signatures:Delegation of the power to sign messages[J]. IEICE Trans Fundamentals, 1996,E79-A(9): 1338- 1353.
  • 2[2]Kim S, Park S, Won D. Proxy signatures, revisited [A]. Proc of ICICS′97[C]. Berlin: Springer-Verlag,1997. 223-232.
  • 3[3]Lee B, Kim H, Kim K. Strong proxy signature and its applications[A]. Proc of SCIS2001[C]. Japan:[s.n.],2001. 603-608.
  • 4[4]Yi L, Bai G, Xiao G. Proxy multi-signature scheme:A new type of proxy signature scheme[J]. Electronics Letters, 2000,36 (6) : 527- 528.
  • 5[6]Horster P, Michels M, Petersen H. Meta-multisignature schemes based on the discrete logarithm problem [A]. Proc of IFIP/SEC′95[C]. South Africa: Chapman & Hall ,1995. 128-142.
  • 6Stinson DR. Crvotoaraohv Theory and Practice. 2nd ed., New York: CRC Press, 2002. 282-285.
  • 7Tan ZW, Liu ZJ. Tang CM. Digital proxy blind signature schemes based on DLP and ECDLP. Vol.21, Beijing: Key Laboratory of Mathematics Mechanization Research, Academy of Mathematics and Systems Science, the Chinese of Academy of Sciences, 2002. 212-217.
  • 8Chaum D. Blind signature systems. In: Chaum D, ed. Proceedings of the Crypto'83. New York: Springer-Vedag, 1998. 153-156.
  • 9Chaum D, Fiat A, Naor M. Untraceable electronic cash. In: Goldwasser S, ed. Proceedings of the Crypto'88. LNCS 403, New York: Springer-Vedag, 1990. 319-327.
  • 10Chaum D, Boen B, Heyst E, Mjolsnes S, Steenbeek A. Efficient off-line electronic check. In: Quisquater J. Vandewalle J, eds. Proceedings of the Eurocrypt'89. LNCS 434, Berlin: Springer-Verlag, 1990. 294-301.

共引文献115

同被引文献8

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部