期刊文献+

一个已知签名人的门限代理签名方案的改进 被引量:4

Improvement of Threshold Proxy Signature Scheme with Known Signers
下载PDF
导出
摘要 (t,n)门限代理签名方案是指由指定n个代理签名者的群中的t个或多于t个代理签名者合作代表原始签名人对消息进行签名的方案。Hsu等人提出的已知签名者的不可否认门限代理签名方案(HWW方案)克服了Sun提出的门限代理签名方案的缺点。Tan等人对HWW方案进行了安全性分析,指出其不能抵抗原始签名人与系统权威的合谋攻击。该文指出在HWW方案中,原始签名人与代理签名者合谋也可伪造代理签名,并给出了一个改进方案。 In a (t, n) threshold proxy signature scheme, which is a variant of the proxy signature scheme, the proxy signature key is shared among n proxy signers delegated by the original signer. Any t or more proxy signers can cooperatively sign messages on behalf of the original signer. Hsu, etc. propose a nonrepudiable threshold proxy signature scheme with known sig0ers (HWW scheme), overcoming the disadvantages of the scheme proposed by Sun. Tan, etc. carry out the secure analysis on the HWW scheme and point out that it cannot resist the original signer and the system authority's conspiracy attack. This paper points out that the original signer and proxy signer conspiracy may forge a legal proxy signature in the HWW scheme and gives an improved scheme.
出处 《计算机工程》 CAS CSCD 北大核心 2007年第12期175-177,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60373026) 山东省自然科学基金资助项目(Y2003G02)
关键词 数字签名 门限代理签名 合谋攻击 Digital signature Threshold proxy signature Conspiracy attack
  • 相关文献

参考文献8

  • 1Mambo M,Usuda K,Okamoto E.Proxy Signatures:Delegation of the Power to Sign Messages[J].IEICE Trans.on Fundamentals,1996,E79-A (9):1338-1354.
  • 2Mambo M,Usuda K,Okamoto E.Proxy Signatures for Delegating Signing Operation[C]//Proc.of the 3rd ACM Conference on Computer and Communications Security.1996:48.
  • 3Zhang K.Threshold Proxy Signature Schemes[C]//Proc.of lnfor-mation Security Workshop,Japan.1997-09:191-197.
  • 4Sun H M,Lee N Y,Hwang T.Threshold Proxy Signatures[J].IEEE Proc-Computers & Digital Techniques,1999,146(5):259-263.
  • 5Kim S,Park S,Won D.Proxy Signatures,Revisited[C]//Proc.of the Conf.on Information and Communications Security.Berlin:Spring-Verlag,1997:223-232.
  • 6Sun,H M.An Efficient Nonrepudiable Threshold Proxy Signature Scheme with Known Signers[J].Computer Communications,1999,22(8):717-722.
  • 7Hsu C L,Wu T S,Wu T C.New Nonrepudiable Threshold Proxy Signature Scheme with Known Signers[J].The Journal of Systems and Software,2001,58(2):119-124.
  • 8Tan Zuowen,Liu Zhuojun,Wang Mingsheng.On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes[C]//Proc.of Information Security Practice and Experience.Berlin:Springer-Verlag,2005:374-385.

同被引文献19

引证文献4

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部