期刊文献+

一种安全的群代理多重签名方案

A Group-proxy Multi-signature Scheme with Provably Secure
下载PDF
导出
摘要 在代理签名方案中,代理签名人可以代表原始签名人生成签名。然而,在已知的各种多重代理多重签名方案中,多个原始签名人授权于多个代理人,只有多个代理人合作才可以代表多个原始人生成签名。该文给出了一种安全的群代理多重签名方案,在这种新方案中,多个原始签名人授权给一个代理签名群,代理签名群中的成员可以代表多个原始签名人生成签名。 Proxy signature schemes allow a proxy signer to generate a proxy signature on behalf of an original signer. However, in most previous multi-proxy multi-signature schemes, the group of original signers authorize a group of proxy signers, and only the cooperation of all signers in a proxy group can generate group-proxy multi-signatures. This paper presents a group-proxy multi-signature scheme. In this scheme, a group of original signers authorize a proxy group, the member of the proxy group can generate group-proxy multi-signatures.
作者 尚锐
出处 《计算机安全》 2008年第3期39-41,共3页 Network & Computer Security
关键词 代理签名 代理多重签名 群签名 Proxy signature Proxy multi-signature Group signature
  • 相关文献

参考文献6

二级参考文献14

  • 1[1]M.Mambo,K.Usuda,and E.Okamot.Proxy signatures:Delegation of the power to sign messages [J].IEICE Trans.Fundamentals,1996,E79-A(9):1338-1354.
  • 2[2]S.Kim,S.Park and D.Won proxy signatures,revisited [A].Proc.of ICICS'97,International Conference on Information and Communications Security [C],LNCE,1334,1997:223-232.
  • 3[3]K.Ohta and t.Okamoto.A digital multisignature scheme based on the Fiat-Shamir scheme [A].Advances in Cryptology—ASIACRYTP'91 [C]:.139-148.
  • 4Sun N Y,Electron Lett,1999年,35卷,16期,1323页
  • 5Lee W B,IEE Proc Commput Digit Tech,1998年,145卷,1期,15页
  • 6Chen L,Advances in Cryptology,Euro Crypt'94,1995年,171页
  • 7Mambo M, Usuda K, Okamoto E. Proxy signatures:Delegation of the power to sign messages[J]. IEICE Trans of Fundamentals, 1996 , E79-A(9):1338-1354.
  • 8Sun H M. Efficient nonrepudiable threshold proxy signature scheme with known signers[J]. Computer Communications, 1999, 22(8):717-722.
  • 9Zuhua S. Proxy signature schemes based on factoring[J].Information Processing Letters, 2003, 85 (1): 137-143.
  • 10Ohta K, Okamoto T. Multi-signature schemes secure against active insider attacks[J]. IEICE Trans of Fundamentals, 1999, E82-A(1) :21-32.

共引文献106

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部