期刊文献+

代理签名研究进展

Progress of Proxy Signature Research
下载PDF
导出
摘要 代理签名研究的是如何用安全、可靠和高效的方法实现数字签名权利的转移。本文概述了代理签名的概念、分类和安全性,介绍了10多年来代理签名的研究情况,并对未来的发展方向作了展望。 A proxy signature is the technology which makes a potential signer delegate his signing capability in a secure, reliable and efficient means to a proxy entity, who signs a message on behalf of the original signer. In this paper, the concept, the classification and the security properties of proxy signatures are introduced. A survey on the progress of proxy signature research in the last decade is given. Some trends of the research in the area are discussed.
作者 刘卓军
出处 《北京电子科技学院学报》 2007年第2期5-10,4,共7页 Journal of Beijing Electronic Science And Technology Institute
基金 国家自然科学基金(10371127) 973项目(2004CB318000)
关键词 代理签名 可证安全 多重代理 多重签名 proxy signature provably secure multi-proxy multi-signature
  • 相关文献

参考文献5

二级参考文献48

  • 1A Boldyreva,A Palacio,B Warinschi.Secure Proxy Signature Schemes for Delegation of Signing Rights [EB/OL].Http://eprint.iacr.org/2003
  • 2Y Desmedt ,Y Frankle. Shared Generation of Authenticators and Signatures[C].In: Advances in Cryptology-CRYPTO'91, Berlin: SpringerVerlag, 1992: 457~469
  • 3L Harn. Group-oriented(t,n)-Threshold Digital Signature Scheme Based on Discrete Logarithms[J].IEE Pro of Computers and Digital Techniques, 1994; 141 (5) :307~313
  • 4S J Kim,S J Park,D H Won.Proxy Signatures,revisited[C].In:ICICS97,LNCS 1334, New York: Springer-Verlag, 1997: 223~232
  • 5B Lee,H Kim,K Kim. Strong Proxy Signature and Its Applications[C].In :Proc of SCIS,2001:603~6081
  • 6B Lee,H Kim,K Kim. Secure Mobile Agent Using Strong Non-designated Proxy Signature[C].In:Proc of ACISP,LNCS 2119,Berlin:SpringerVerlag, 2001: 474~486
  • 7M Mambo ,K Usuda,E Okamoto. Proxy Signatures:Delegation of the Power to Sign Messages[C].In:IEICE Trans. Fundamentals, Vol. E79-A,1996:1338~1353
  • 8C P Schnorr. Efficient Signature Generation by Smart Cards[C].In:Journal of Cryptology, 1991 ;4(3): 161~174
  • 9石怡 冯登国.一类新型(tj,t,n)-门限群签名方案的设计与分析[C]..密码学进展-China Crypto''2000[C].科学出版社,2000..
  • 10Stinson D R.Cryptography Theory and Practice[M].Second Edition,New York: CRC Press,2002: 282~285

共引文献127

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部