期刊文献+

一种可抗DLC攻击的强代理签名方案

Strong Proxy Signature Against DLC Attack
下载PDF
导出
摘要 针对B.Lee等人强代理签名方案易受DLC攻击,提出了一种新的强代理签名方案,通过代理签名人私钥的逆来防止原始签名人DLC攻击,将原始签名人对代理私钥的DLC攻击由线性运算转化为离散对数运算,使攻击难度由O(n)提高到指数阶,增加了代理私钥的计算复杂度,使原始签名人无法从代理私钥中分离和删除出自己的私钥,从而无法伪造签名。经分析,新方案不仅能够抵抗原始签名人的DLC攻击,而且提高了安全性能和计算效率。 A new strong proxy signature scheme is proposed aiming at the DLC attack in B. Lee's scheme, the original signer's DLC attack with inversion operation of the proxy signer's private key is prevented, changed linear operation to DLP against the original signer's DLC attack, increased the complexity of proxy private key, and made it impossible to delete his/her private key with DLC attack. So the original signer cann't forge a signature or impose it on the proxy signer. The revised scheme improves the security and efficiency.
出处 《科学技术与工程》 2007年第6期1074-1076,1080,共4页 Science Technology and Engineering
关键词 代理签名 Sehnorr签名方案 强代理签名方案 DLC攻击 proxy signature blind signature strong proxy signature
  • 相关文献

参考文献9

  • 1[1]Mambo M,Usuda K,Okamoto E.Proxy signature:delegation of the power to sign messag e,IEICE Trans.Fundamentals,1996; E79-A(09):1338-1353
  • 2[2]Lee By,Kim H,Kim K,Strong proxy signature and its applications.Proceedings of the 2001 Symposium on Cryptography and Information Security (SCIS 2001),Vol.2/2,603-608,Oiso,Japan,Jan.23-26.2001
  • 3[3]Seungjoo Kim,SangJoon Park,Dongho Won,Proxy Signatures,Revisited,International Conference on Information and Communications Security (ICISG'97),1997:223-232
  • 4[4]Herranz J,Saez G.Full Distributed Proxy Signature Schemes,The proceedings of Financial Cryptography Conference 2003,Available athttp://eprint.iacr.org/2002/051/,2002
  • 5[4]Dong Zheng,Liu Shengli,Chen Kefei,Cryptanalysis of B.Lee-S.Kim-K.Kim Proxy Signature,Available at http://eprint.iacr.org/2003/200/,2003
  • 6[5]Tan Z,Liu Z,Tang C.Digital proxy blind signature schemes based on DLP and ECDLP,MM Research Preprints,December,2002;(21):212-2176 Schnorr C.P.Efficient signature generation by smartcards,Journal of Cryptography,1991 ;4:161-171
  • 7[7]Sunder Lal,Amit Kumar Awasthi,Proxy Blind Signature Scheme,Available at http://eprint.iacr.org/2003/072/,2003
  • 8[8]Pointcheval D,Stem J.Security proofs for signature schemes,Advances in Cryptology Eurocrypto'96,LNCS 1070,1996:387-398
  • 9[9]Chaum D,Blind signature for untraceable payments,Advances in Cryptology Crypto 82,Plenum,NY,1983:199-203

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部