期刊文献+

几个改进的LKK代理签名方案分析 被引量:2

Analysis of some improved LKK proxy signature schemes
下载PDF
导出
摘要 强不可伪造性和对安全信道依赖性的分析是对LKK代理签名方案安全性分析的重要内容之一。对文献[6-8]中的改进的LKK代理签名方案进行安全性分析,指出文献[6,7]中的方案仍存在缺陷并给出攻击方法,指出文献[8]中方案是一个具有强不可伪造性的不需要安全信道的方案。 The analysis of the property of the strong unforgeability and the necessity of a secure channel is one of the important content for the security analysis of the LKK proxy signature scheme.In this paper,we present a security analysis of some improved LKK proxy signature schemes,proposed in [6-8].We point out the schemes,proposed in [6,7],still have weakness and present the attack methods to them.And we point out the scheme,proposed in [8] ,can keep the property of the strong unforgeability and does not need the secure channel.
作者 陈凯 鲍皖苏
出处 《计算机工程与应用》 CSCD 北大核心 2007年第18期150-152,173,共4页 Computer Engineering and Applications
基金 河南省杰出青年科学基金资助项目(No.0312001800)。
关键词 代理签名 强不可伪造性 安全信道 安全性分析 proxy signature strong unforgeability secure channel security analysis
  • 相关文献

参考文献8

  • 1Mambo M,Usuda K,Okamoto E.Proxy signature:delegation of the power to sign messages[J].IEICE Trans Fundamental,1996,E79-A:1338-1353.
  • 2Lee B,Kim H,Kim K.Strong proxy signature and its applications[C]//Proc of the 2001 Symposium on Cryptography and Information Security (SCIS'01),2001:603-608.
  • 3Lee J Y,Cheon J H,Kim S.An analysis of proxy signatures:is a secure channel necessary?[C]//LNCS 2612:CT-RSA 2003,SpringerVerlag,2003:68-79.
  • 4Sun H M,Hsieh B T.On the security of some proxy signature schemes[EB/OL].(2003).http://eprint.iacr.org.
  • 5Wang Gui-lin,Bao Feng,Zhou Jian-ying,et al.Security analysis of some proxy signatures[C]//LNCS 2971:Information Security and CryptologyICISC 2003,Springer-Verlag,2004:305-319.
  • 6杨伟强,徐秋亮.典型代理签名方案的分析与改进[J].计算机工程与应用,2004,40(9):152-154. 被引量:11
  • 7黄文平.一些不需要安全通道代理签名的分析与改进[J].计算机工程与应用,2005,41(28):127-130. 被引量:6
  • 8杨淑娣,姚正安.一个改进的强代理签名方案[J].计算机应用研究,2004,21(8):119-121. 被引量:5

二级参考文献46

  • 1[1]B Lee,H Kim,K Kim. Strong Proxy Signature and its Applications[C].In:Proc of SCIS 2001,2001:603~608
  • 2[2]B Lee,H Kim, K Kim.Secure Mobile Agent using Strong Non-designated Proxy Signature[C].In:Proc ACIS,2001:474~486
  • 3[3]V Varadharajan,P Allen,S Black. An analysis of the proxy problem in distributed systems[C].In:Proc IEEE Computer Society Symp on Research in Security and Privacy,1991:255~275
  • 4[4]B C Neuman.Proxy-based authorization and accounting for distributed systems[C].In :Proc 13th International Conference on Distributed Computing Systems, 1993:283~291
  • 5[5]M Mambo,K Usuda,E Okamoto. Proxy Signature:Delegation of the Power to Sign Messages[J].IEICE Trans Fundamentals,1996;E79-A:1338~1353
  • 6[6]S Kim,S Park,D Won. Proxy Signature,revisited[C].In:Proc of ICICS′97 International Conference on Information and Communication Security, 1997: 223~232
  • 7[7]D Pointcheval,J Stern.Security proofs for signatures[C].In:Advances in Cryptology: Eurocrypt96, Berlin: springer, 1996: 387~398
  • 8[8]H Petersen,P Horster. Self-certified keys-Concepts and Applications[C].In:Proc Communications and Multimedia Security97,Chapman & Hall,1997:102~116
  • 9[9]H Kim,J Baek,B Lee et al. Computing with secrets for mobile agent using one-time proxy signature[C].In:SCIS′2001,2001:845~850
  • 10[10]K Shum. A Strong Proxy Signature Scheme with Proxy Signer Privacy Protection[D].MPhil Thesis. Dep of Information Engineering,Chinese University of Hong Kong,2002

共引文献14

同被引文献12

  • 1杨淑娣,姚正安.一个改进的强代理签名方案[J].计算机应用研究,2004,21(8):119-121. 被引量:5
  • 2黄文平.一些不需要安全通道代理签名的分析与改进[J].计算机工程与应用,2005,41(28):127-130. 被引量:6
  • 3MAMBO M, USUDA K, OKAMOTO E. Proxy signature: delegation of the power to sign messages [J]. IEICE Transaction on Fundamentals of Electronic Communications and Computer Science, 1996, 9: 1338-1354.
  • 4LEE B, KIM H, KIM K. Strong proxy signature and its applications[J]. SCIS 2001, 2001, 2(2) : 603-608.
  • 5SUN Hung-Min, HSIEH Bin-Tsan . On the secur ity of some proxy signature schemes [J]. Cryptology ePrint Archive, Report 2003/068, http ://eprint. iacr. org, 2003.
  • 6Mambo M,Usuda K,Okamoto E.Proxy signature:Delegation of the power to sign messages[J].IEICE Transaction on Fundamentals of Electronic Communications and Computer Science, 1996(9) : 1335- 1354.
  • 7Lee B,Kim H,Kim K.Strong proxy signature and its applications[C]// SCIS2001,2001,2 ( 2 ) : 603 -608.
  • 8Yi Li-jiang,Bai Guo-qiang,Xiao Guo-zhen.Proxy multi-signature scheme:A new type of proxy signature scheme[J].Electronic Letters, 2000,36(6):527-528.
  • 9Hwang S J,Shi C.A simple muhi-proxy signature scheme[C]//Proceedings of the 10th National Conference on Information Security, Taiwan, 2000:134-138.
  • 10Hwang S J,Chen C C.A new multi-proxy multi-signature scheme[C]// Proceedings of National Computer Symposium:Information Security, Taiwan, 2001 : F019-F026.

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部