期刊文献+

对代理盲签名体制的攻击与改进 被引量:2

Attack and corresponding improvement to proxy blind signature schemes
下载PDF
导出
摘要 代理盲签名方案在实际应用中存在以下安全问题:首先是在代理签名者和消息拥有者的会话阶段容易受到恶意攻击,攻击者能使代理签名者在毫不知情的情况下对任意消息进行代理盲签名,这损害了原始签名者和代理签名者的利益;其次是代理签名者对签名权的滥用。给出了一种具体的攻击方法,并结合一具体的代理盲签名方案,通过运用授权证书结合身份认证给出了对此类攻击的防范措施,使代理盲签名体制的安全性得到了加强。 There are some problems in security when proxy blind signature schemes are used in practice. Firstly, proxy signature scheme would be attacked maliciously during the phase of communication between the proxy signer and the message owner. Attackers can make the proxy signer sign blindly on any document without any awareness of the proxy signer, which jeopardize the interests of both the proxy signer and the original signer. Secondly, there is the possibility for the proxy signer to abuse the right to sign. A specified way of attacking is given, and the precautions and measures are given by employing letter of authorization and identification attestation combining with a specific blind signature scheme, which reinforce the security of proxy blind signature scheme.
出处 《计算机工程与设计》 CSCD 北大核心 2007年第18期4354-4356,共3页 Computer Engineering and Design
基金 国家自然科学基金项目(60373026) 山东省自然科学基金项目(Y2003G02)。
关键词 数字签名 代理签名 盲签名 代理盲签名 攻击者 digital signature proxy signature blind signature proxy blind signature attacker
  • 相关文献

参考文献3

二级参考文献11

  • 1[1]Mambo M, Usuda K, Okamoto E. Proxy signature: Delegation to sign messages. IEICE Transactions on Fundamentals, 1996,E79-A (9): 1338~1354
  • 2[2]Kim S, Park S, Won D. Proxy signatures, revisited. In: Lecture Notes in Computer Science 1334, Berlin: Springer-Verlag, 1997, 1334:223~232
  • 3[3]Zhang K. Threshold proxy signature scheme. In:Proceedings of Information Security Workshop, Japan, 1977. 101 ~ 109
  • 4[4]Yi L J, Bai G Q, Xiao G Z. Proxy multi-signature scheme: A new type of proxy signature scherne. Electronics Letters, 2000,36(6) :527~528
  • 5D. Chaum. Blind signature for untraceable payments [C]. Advanced in Cryptology, Proc. Crypto' 82, Lecture Notes in Computer Science, Springer- Verlag, 1983.199-203.
  • 6J. L. Chamenisch, et al. Blind signatures based on the discrete logarithm problem [C]. Rump Session of Eurocrypt'94,1995.
  • 7Ham L. Cryptanalysis of blind signature based on the discrete logarithm problem [J]. Electronic Letter. 1995.31(14): 1136.
  • 8L. Harn, T. Keisler. New scheme for digital multisignatures [J]. Electro. Lett., 1989,25 (15): 1002-1003.
  • 9Ham L, Xu Y. Design of generalized ElGamal type digital signature schemes based on discrete logarithm [J].Electronic Letters, 1994,30 (24): 2025-2026.
  • 10祁明 卓光辉.盲签名方案的分类及其应用[J].通信保密,1999,(3).

共引文献30

同被引文献11

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部