期刊文献+

一种新型的代理签名方案的改进 被引量:2

Improvement of a New Proxy Signature Scheme
下载PDF
导出
摘要 该文对谷利泽(2005)等人提出的一种新型的匿名代理签名方案进行密码分析,指出此方案是不安全的,它无法抵抗原始签名人的伪造攻击,并给出了4种攻击方法。针对此方案的缺陷,提出了两种改进方案,并证明改进后的方案是安全的,可抵抗原始签名人恶意的伪造攻击。 In this paper, a new anonymous proxy signature scheme proposed by Gu Li-ze et al.(2005) is cryptanalyzed in detail and is proved that this scheme is not secure against the original signer's forgery attack and then four methods to attack the new scheme are found. To avoid these attacks, the new scheme is revised and two improved schemes are given. Finally, the improved schemes are concluded that they are both secure against the original signer's forgery attack.
作者 郭刚 曾国平
出处 《电子与信息学报》 EI CSCD 北大核心 2008年第1期245-248,共4页 Journal of Electronics & Information Technology
关键词 数字签名 代理签名 匿名性 可追踪性 Digital signature Proxy signature Anonymity Traceability
  • 相关文献

参考文献6

  • 1Mambo M, Usuda K, and Okamoto E. Proxy signatures: Delegation of the power to sign messages. IEICE Trans. on Fundamental. 1996, E78-A (9): 1378-1353.
  • 2Shum K and Weil V K. A strong proxy signature scheme with proxy signer privacy protection. Proceedings of the Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE'02), Pittsburgh, Pennsylvania, USA, 2002: 55-56.
  • 3Lee Narn-Yih and Lee Ming-Feng. The security of a strong proxy signature scheme with proxy signer privacy protection. Applied Mathematics and Computation, 2005, 161(3): 807-812.
  • 4谷利泽,李中献,杨义先.不需要可信任方的匿名代理签名方案[J].北京邮电大学学报,2005,28(1):48-50. 被引量:24
  • 5柳菊霞,吴良杰,苏靖枫,付蓉.匿名代理签名方案的研究与改进[J].信息安全与通信保密,2006,28(3):75-77. 被引量:8
  • 6谷利泽,张胜,杨义先.一种新型的代理签名方案[J].电子与信息学报,2005,27(9):1463-1466. 被引量:18

二级参考文献15

  • 1谷利泽,李中献,杨义先.不需要可信任方的匿名代理签名方案[J].北京邮电大学学报,2005,28(1):48-50. 被引量:24
  • 2[1]Mambo M,Usuda K,Okamoto E.Proxy signature Delegation of the power to sign messages[A].IEICE Trans on Fundamentals[C].1996,E79-A(9):1338-1354
  • 3[2]Shum K,Wei V K.A strong proxy signature scheme with proxy signer privacy protection[A].Proceedings of the Eleventh IEEE International Workshops on Enabling Technologies:Infrastructure for Collaborative Enterprises (WETICE' 02),Pittsburgh,Pennsylvania,USA,2002:55-56
  • 4[3]Lee Narn-Yih,Lee Ming-Feng.The security of a strong proxy signature scheme with proxy signer privacy protection[J].Applied Mathematics and Computation,2005,161:807-812
  • 5Mambo M, Usuda K, Okamoto E. Proxy signature:delegation of the power to sign messages[A]. EICE Trans Fundamentals[C]. 1996. 1338-1353.
  • 6Lee B, Kim H, Kim K. Strong proxy signature and it's applications [A]. International Conference on Information and Communication Security, Proc of SCIS[C]. Japan, 2001. 603-608.
  • 7Kim S, Park S, Won D. Proxy signature, revisited[A]. International Conference on Information and Communication Security, Proc of ICICS[C]. Berlin,1997. 223-232.
  • 8Lee B, Kim H, Kim K. Secure mobile agent using strong non-designated proxy signature FA 1. Proc ACISP[C]. Spring-Verlag, 2001. LNCS 1 334, 474-486.
  • 9Shum K, Wei Victor K. A strong proxy signature scheme with proxy signer privacy protection [EB/OL]. http: // www. computer. org/proceedings/wetice/1748/17480055. pdf, 2002.
  • 10Boyd C. Comment :new digital signature scheme based discrete logarithm[J]. Electronics Letters, 1994, 30(6) : 480-481.

共引文献39

同被引文献19

  • 1谷利泽,李中献,杨义先.不需要可信任方的匿名代理签名方案[J].北京邮电大学学报,2005,28(1):48-50. 被引量:24
  • 2谷利泽,张胜,杨义先.一种新型的代理签名方案[J].电子与信息学报,2005,27(9):1463-1466. 被引量:18
  • 3赵泽茂.基于椭圆曲线的代理盲签名方案[J].河海大学学报(自然科学版),2006,34(3):329-332. 被引量:5
  • 4Mambo M,Usuda K,Okamoto E.Proxy signature:Delegation of the power to sign messages[J].IEICE Trans on Fundamental, 1996,E78-A(9) : 1353-1378.
  • 5Shum K, Weil V K.A strong proxy signature scheme with proxy signer privacy protection[C]//Proceedings of the 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises(WETICE'02),Pittsburgh, Pennsylvania, USA, 2002 : 55-56.
  • 6Cao T,Lin D,Xue R.ID-based designated-verifier proxy signatures[J].IEE Proceedings-Communications,2005,152(6) :989-994.
  • 7左为平,王彩芬,杨晓亚,等.具有恢复的指定验证人代理多重签名方案[C]//张焕国,贾中平.密码学进展-中国密码学会2008年会议论文集,武汉,2008:303-309.
  • 8Mambo M, Usuda K, Okamoto E. Proxy signature for delegating signing opreation[C]//Proceeding of the 3rd AC'M Conference on computer and communication security, 1996:48-57.
  • 9Anderson R. Two Remarks on Public Key Cryptology[C] ffProceeding of the 4th ACM Computer and Communication Securi- ty, 1997.
  • 10Boneh D, Lynn B, Shacham H. Short Signatures from the Well Pairing[C]//Proceeding. of ASIACRYPT'01, 2001:514- 532.

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部