期刊文献+

IMPROVEMENT OF NONREPUDIABLE THRESHOLD MULTI-PROXY THRESHOLD MULTI-SIGNATURE SCHEME WITH SHARED VERIFICATION 被引量:2

IMPROVEMENT OF NONREPUDIABLE THRESHOLD MULTI-PROXY THRESHOLD MULTI-SIGNATURE SCHEME WITH SHARED VERIFICATION
下载PDF
导出
摘要 In 2005, Bao, et al. [Appl. Math. and Comput., vol.169, No.2, 2005] showed that Tzeng, et al.’s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification was insecure, and proposed an improved scheme with no Share Distribution Center (SDC). This paper shows that Bao, et al.’s scheme suffers from the proxy relationship inversion attack and forgery attack, and pro- poses an improvement of Bao, et al.’s scheme. In 2005, Bao, et al. [Appl. Math. and Comput., vol.169, No.2, 2005] showed that Tzeng, et al.'s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification was insecure, and proposed an improved scheme with no Share Distribution Center (SDC). This paper shows that Bao, et al.'s scheme suffers from the proxy relationship inversion attack and forgery attack, and proposes an improvement of Bao, et al.'s scheme.
出处 《Journal of Electronics(China)》 2007年第6期806-811,共6页 电子科学学刊(英文版)
基金 Supported by the National Natural Science Foundation of China (No.10671051) the Natural Science Foundation of Zhejiang Province (No.Y105067).
关键词 Digital signature Proxy signature Threshold proxy signature Threshold multi-proxy threshold multi-signature Threshold verification 计算机技术 安全技术 保密技术 设计方案
  • 相关文献

参考文献10

  • 1M. Mambo,K. Usuda,and E. Okamoto.Proxy sig- natures: delegation of the power to sign messages[].IEICE Trans on Fundamentals.1996
  • 2S. Kim,S. Park,and D. Won.Proxy signatures, re- visited[].Proc of ICICS’.1997
  • 3K. Zhang.Threshold proxy signature schemes[].Information Security Workshop.1997
  • 4H. M. Sun,N. Y. Lee,and T. Hwang.Threshold proxy signatures[].IEE Proceedings-Computers and DigitalTechniques.1999
  • 5S. J. Hwang,C. C. Chen.Cryptanalysis of non- repudiable threshold proxy signature scheme with known signers[].Fundamental Informaticae.2003
  • 6C. L. Hsu,T. S. Wu,and T. C. Wu.Improvement of threshold proxy signature scheme[].Applied Mathe- matics and Computation.2003
  • 7L. H. Li,S. F. Tzeng,and M. S. Hwang.Generaliza- tion of proxy signature-based on discrete logarithms[].Computers & Security.2003
  • 8S. F. Tzeng,C. Y. Yang,and M. S. Hwang.A non- repudiable threshold multi-proxy multisignature scheme with shared verification[].Future Generation Computer Systems.2004
  • 9Haiyong Bao,Zhenfu Cao,and Shengbao Wang.Im- provement on Tzeng et al.’s nonrepudiable threshold multi-proxy multi-signature scheme with shared veri- fication[].Applied Mathematics and Computation.2005
  • 10HWANG M S,LIN I C,LU E J L.A secure nonrepudiable threshold proxy signature scheme with known signers[].International Journal of Information.2000

同被引文献25

  • 1王萌,刘志镜.基于用户身份加密体系中的门限代理签密方案[J].计算机工程与应用,2006,42(7):126-128. 被引量:5
  • 2谢琪,于秀源.一个门限代理签名方案的进一步改进[J].计算机应用研究,2006,23(10):103-106. 被引量:1
  • 3张学军,王育民.高效的基于身份的代理签密[J].计算机工程与应用,2007,43(3):109-111. 被引量:14
  • 4Mambo M, Usuda K, Okamoto E.Proxy signature:delegation of the power to sign message[J].IEICE Trans on Fundamentals,1996,E79- A(9) : 1338-1354.
  • 5Huang H F,Chang C C.A novel efficient (t,n) threshold proxy signature scheme[J].Information Science,2006,176:1338-1449.
  • 6Kim S,Park S,Won D.Proxy signature,revisited[C]//Han Y.International Conference on Information and Comunications Security. Berlin: Springer-Verlag, 1997.
  • 7Zhang K.Threshold proxy signature schemes[C]//Japan Information Security Workshop, 1997:192-197.
  • 8Wang C T,Cheng C C,Lin C H.Ceneralization of Threshold signature and authenticated encryption for group communications[J].IEICE Trans Fund,2000,E83-A(6):1228-1237.
  • 9Zheng Y L.Signcryption and its application in efficient public key solution [C]//LNCS 1397 : Information Security Workshop.Berlin : Springer-Verlag, 1997.
  • 10YiMu,VijayVaradharajan.Distributed signcryption [J].Leeture Notes in Computer Seienee:IN2DOCRYPT 2000,2000,1977.

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部