期刊文献+

新的不可否认门限代理签名方案 被引量:3

New nonrepudiable threshold proxy signature scheme
下载PDF
导出
摘要 对文献的门限代理签名方案进行了密码分析,发现该方案不能抵抗内部攻击和公钥替换攻击.提出了一个新的安全高效的不可否认门限代理签名方案,新方案克服了原方案的缺点,不仅能够抵抗内部攻击、公钥替换攻击和合谋攻击,而且满足安全门限代理签名方案的安全要求,可以在公开信道中进行. Through the cryptanalysis of a threshold proxy signature scheme in literature, the scheme could not resist insider attacks and public-key substitute attacks. A new nonrepudiable scheme with high safety and efficiency was proposed. The new scheme remedies the weaknesses of the literature's, i.e. it can resist the insider attack and the public-key substitute attack and has the properties of threshold proxy signature scheme. It can resist the collusion attack and can be realized in a public channel.
出处 《兰州大学学报(自然科学版)》 CAS CSCD 北大核心 2008年第3期77-80,86,共5页 Journal of Lanzhou University(Natural Sciences)
基金 国家自然科学基金(10571113) 陕西省自然科学基金(2004A14) 陕西省科学研究计划自然科学项目(07JK375) 陕西师范大学研究生培养创新基金(2007CXS018)资助.
关键词 门限代理签名 内部攻击 公钥替换攻击 合谋攻击 threshold proxy signature insider attack public-key substitute attack collusion attack
  • 相关文献

参考文献12

  • 1MAMBO M, USUDA K, OKAMOTO E. Proxy signature: delegation of the power to sign messages[J]. IEICE Transactions on Fundamentals of Electronic Communications and Computer Science, 1996, 9; 1 338-1 354.
  • 2MAMBO M, USUDA K, OKAMOTO E. Proxy signatures for delegating signing operation[C]//Proceedings of the Third ACM Conference on Computer and Communications Security. New York: ACM Press, 1996: 48-57.
  • 3KIM S, PARK S, WON D. Proxy signatures[C]// Proceedings of International Conference on Information and Communications Security(ICICS'97), Lecture Notes in Computer Science. Berlin:Springer-Verlag, 1997: 223-232.
  • 4ZHANG K. Threshold proxy signature schemes[C] ///Proceedings of Seventh National Conference on information Security. BerlinSpringer-Verlag, 1997: 191-197.
  • 5SUN H M, LEE N Y, HWANG T. Threshold proxy signatures[J]. IEE Proceedings Computers and Digital Techniques,1999, 146(5): 259-263.
  • 6SUN H M. An efficient nonrepudiable threshold proxy signature scheme with known signers[J]. Computer Communications, 1999, 22(8): 717-722.
  • 7Hsu C L, Wu T S, Wu T C. New nonrepudiable threshold proxy signature scheme with known signers[J]. System sand Software, 2001, 58(2): 119-124.
  • 8Hsu C L, Wu T S, Wu T C. Improvement of threshold proxy signature schemes[J]. Applied Mathematics and Computation, 2003, 136(23): 315-321.
  • 9YANG C H, TZENG S F, HWANG M S. On the efficiency of nonrepudiable threshold proxy signature scheme with known signers[J]. Systems and Software, 2004, 73(3): 507-514.
  • 10王天银,蔡晓秋,张建中.对一种门限代理签名方案的密码分析及改进[J].计算机应用,2006,26(7):1631-1633. 被引量:4

二级参考文献21

  • 1王茜,倪建伟.一种基于RSA的加密算法[J].重庆大学学报(自然科学版),2005,28(1):68-72. 被引量:14
  • 2刘锋,张建中.一个具有完善保密性的秘密分享方案[J].济南大学学报(自然科学版),2005,19(2):124-125. 被引量:4
  • 3SUN H M,SHIEH S P.Construction of dynamic threshold schemes[J].Electron Letters,1994,30(24):2023-2024.
  • 4PINCH R G E.On-line multiple secret sharing[J].Electronic Letters,1996,32(12):1087-1088.
  • 5YEUN C Y,MITCHELL C J,MIKE B M.An online secret sharing which identifies all cheaters[C]//Proceeding of NORDSEC'98.Oslo,Norway:The Third Nordic-Workshop on Secure IT Systems,1998.
  • 6MAMBO M, USUDA K, OKAMOTO E. Proxy signatures for delegating signing operation[ A]. Proceedings of the 3rd ACM Conference on Computer and Communications Security[ C]. New Dehi, India:ACM Press, 1996.48 -57.
  • 7MAMBO M, USUDA K, OKAMOTO E. Proxy signatures: delegation of the power to sign messages[J]. IEICE Transactions Fundamentals, 1996, E79A(9):1338 -1354.
  • 8ZHANG K. Threshold proxy signature schemes[ A]. Proceedings of the First International Workshop on Information Security[ C]. Berlin: Springer-Verlag, 1997. 191 - 197.
  • 9KIM S, PARK S, WON D. Proxy signatures, revisited[A]. Proceedings of International Conference on Information and Communications Security[ C]. Berlin: Springer-Verlag, 1997. LNCS1334, 223- 232.
  • 10SUM HM, LEE NY, HWANG T. Threshold proxy signatures[J].IEE Proceedings of Computers & Digital Techniques, 1999, 146(5) : 259 -263.

共引文献12

同被引文献32

  • 1王晓明,张震,符方伟.一个安全的门限代理签名方案[J].电子与信息学报,2006,28(7):1308-1311. 被引量:7
  • 2张忠,徐秋亮.一种高效的不可否认门限代理签名方案的分析及改进[J].计算机工程与科学,2006,28(9):7-8. 被引量:2
  • 3李丽媛,徐秋亮.已知签名人的门限代理签名方案[J].北京邮电大学学报,2006,29(4):103-106. 被引量:4
  • 4蒋瀚,徐秋亮,周永彬.基于RSA密码体制的门限代理签名[J].计算机学报,2007,30(2):241-247. 被引量:13
  • 5Mambo M, Usuda K, Okamoto E. Proxy Signature: Delegation of the Power to Sign Messages[J]. IEICE Trans. on Fundamentals, 1996, E79-A(9): 1338-1354.
  • 6Mambo M, Usuda K, Okamoto E. Proxy Signatures for Delegating Signing Operation[C]//Proc. of the 3rd ACM Conf. on Computer and Communications Security. New Delhi, India: ACM Press, 1996.
  • 7Zhang Kan. Threshold Proxy Signature Schemes[C]//Proceedings of ISW'97. Tatsunokuchi, Japan: [s. n.], 1997.
  • 8Hsu Chien-Lung, Wu Tzong-Sun, Wu Tzong-Chen. Improvement of Threshold Proxy Signature Scheme[J]. Applied Mathematics and Computation, 2003, 136(23): 315-321.
  • 9Tzeng Shiang-Feng, Yang Cheng-Ying, Hwang Min-Shiang. A Nonrepudiable Threshold Multi-proxy Multi-signature Scheme with Shared Verification[J]. Future Generation Computer Systems, 2004, 20(5): 887-893.
  • 10Shao Zuhua. Improvement of Efficient Proxy Signature Schemes Using Self-certified Public Keys[J]. Applied Mathematics and Computation, 2005, 168(1): 222-234.

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部