期刊文献+

一种改进的指定证实人数字签名算法

Study of consigned designated confirmer digital signature based on elliptic curve
下载PDF
导出
摘要 通过对指定证实人签名方案的分析,指出了方案中存在的缺陷.提出了委托型指定证实人签名方案,并给出了新的算法.补充了身份认证委托证明人机制,实现了个人隐私的保护.通过对委托人、指定证实人的权限进行管理,实现了与普通数字签名的相互转换,解决了算法的安全性及通用性问题. The signature scheme based on designated confirmer was analyzed and the pitfalls on the generalization and security factors were pointed out. A signature scheme of authorized designated confirmer was established for the first time and the improved algorithm was proposed. The authen- ticated identifying consigner based mechanism was advanced. The protection for personal privacy was also established. At the same time, the conversion to common digital signature could be realized. The right assigned to the consigner or designated confirmer could be recalled as an optional scheme for the security and commonality problem.
作者 武海燕
出处 《山东理工大学学报(自然科学版)》 CAS 2007年第3期101-103,共3页 Journal of Shandong University of Technology:Natural Science Edition
关键词 数字签名 委托证明人 机制 委托人 委托证实人 Digital signature entrusting authentication mechanism entruster consigned designated confirmer
  • 相关文献

参考文献6

二级参考文献46

  • 1.GB 15851-1995,IS0/IEC 9796,信息技术安全技术IDT.带消息恢复的数字签名方案[A]..中华人民共和国国家标准.[C].,1991..
  • 2冯登国.国内外信息安全研究现状及其发展趋势[J].互联网世界网络安全专刊,2002,.
  • 3[1]T Okamoto.Designated confirmer signatures and public-key encryption are equivalent [A].Advances in cryptology-crypto'94 [C].New York:Springer-Verlag,1994.61-74.
  • 4[2]D Chaum.Designated confirmer signatures [A].Advances in cryptology-eurocrypto'90 Proc.[C].Berlin:Springer-Verlag,1995.86-91.
  • 5[3]D Chaum,H van Antwerpen.Undeniable signatures [A].Advances in cryptology-crypto'89 [C].Berlin:Springer-Verlag,1990.212-216.
  • 6[4]K Nguyer,Y Mu,V Varadharajan.Undeniable confirmer signature [A].Proc.Inform.Security Workshop'99 [C].Tokyo:Springer-Verlag,1999.62-73.
  • 7[5]D Chaum.Zero-knowledge undeniable signatures [A].Advances in cryptology-eurocrypto'90 [C].Berlin:Spinger-Verlag,1990.458-464.
  • 8[6]M Jakobsson,K Sako,R Impagliazzo.Designated verfier proofs and their applications [A].Advances in Cryptology-Eurocrypto'98 Proc.[C].Finland:Springer-Verlag,1998.210-226.
  • 9[7]Y Desmedt,M Yung.Weaknesses with undeniable signatures schemes [A].Advances in cryptology-eurocrypto'91 Proc.[C].England:Springer-Verlag,1991.205-220.
  • 10[8]J Boyar,D Chaum,I Damgrd.Convertible undeniable signatures [A].Advances in cryptology-crypto'90 Proc.[C].Berlin:Springer-Verlag,1991.189-205.

共引文献78

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部