期刊文献+

基于离散对数的前向安全代理签名方案 被引量:10

Forward-Secure Proxy Signature Scheme Based on Discrete Logarithm
下载PDF
导出
摘要 基于前向安全性思想和代理签名理论,提出了一种具有前向安全性的代理签名方案。该方案的安全性依赖于求有限域中离散对数的困难性,将整个签名的有效时间分为T个时间段,密钥进化算法使得不同时段的密钥不同,即使代理签名人第i个时间段的密钥泄露,此前其所产生的代理签名依然有效。 On the basis of forward-security and the theory of digital signature, a forward-secure proxy signature scheme was presented. The security of the scheme relies on difficuty of solving discrete logarithm problem in a finite range. The effective period is divided into T periods. The key of each period is different because of key evolution algorithm. Even if an adversary has gotten the current signer's key, previous generated proxy signature remains still valid.
作者 王亮 贾小珠
出处 《青岛大学学报(自然科学版)》 CAS 2007年第2期46-49,共4页 Journal of Qingdao University(Natural Science Edition)
关键词 数字签名 代理签名 前向安全 digital signature proxy signature forward-security
  • 相关文献

参考文献9

二级参考文献36

  • 1MAMBO M, USUDA K, OKAMOTO E. Proxy signature: delegation of the power to sign messages[J]. IEICE Trans Fundamentals, 1996,79(9): 1338-1354.
  • 2MAMBO M, USUDA K, OKAMOTO E. Proxy signature for delegating signing operation[A]. Proc 3rd ACM Conference on Computer and Communications Security[C]. New Delhi: ACM Press,1996. 48-49.
  • 3YI L J, BAI G Q, XIAO G Z. Proxy multi-signature scheme: a new type of proxy signature scheme[J]. Electronics Letters, 2000, 36(6):527-528.
  • 4ZHANG K. Non-repudiable proxy signature schemes[EB/OL], http://citeseer.nj.nec.com/360090, html, 1999.
  • 5ZHANG K. Threshold proxy signature schemes[A]. 1997 Information Security Workshop[C]. Japan, Springer-Verlag, 1997. 191-197.
  • 6KIM S, PARK S, WON D. Proxy signature, revisited[A]. Proceedings ICICS'97, Lecture Notes in Computer Science 1334[C]. Berlin:Springer-Verlag, 1997. 223-232.
  • 7ANDWESON R. Invited lecture[EB/OL], http://citeseer. nj.nec.com/anderson06forwarssecure.html, 1997.
  • 8KOZLOY A, REYZIN L. Forward secure signature with fast keyupdate[EB/OL], http://cit eseer.nj .nec.com/kozlov02forwarssecure.html,1998.
  • 9A Fiat,A Shamir.How to prove yourself:practical solutions to identification and signature problems[C].In:Advances in Cryptology-Crypto' 86,Lecture Notes of Computer Science, 1986:186-194.
  • 10M Bellare,S K Miner.A forward-secure digital signature scheme[C]. In : Advances in Cryptology-Crypto ' 99, Lecture Notes of Computer Science, 1999 : 431-448.

共引文献56

同被引文献59

引证文献10

二级引证文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部