期刊文献+

基于椭圆曲线的前向安全代理签名方案 被引量:2

A Forward-Secure Proxy Signature Scheme Based on Elliptic Curve Cryptosystem
下载PDF
导出
摘要 为解决普通代理签名方案因代理签名密钥泄漏对系统造成的危害,提出一个基于椭圆曲线的前向安全代理签名方案,并在推广的强假定及椭圆曲线离散对数问题(ECDLP)难解的假定下,分析该方案的安全性。 A forward - secure proxy signature scheme based on elliptic curve cryptosystem was proposed to overcome the limitation of the ordinary proxy signature schemes. We analyzed the security of the new scheme under the generalized strong RSA assumption and the difficulty of elliptic curve discrete logarithm problem.
出处 《济南大学学报(自然科学版)》 CAS 2008年第3期263-265,共3页 Journal of University of Jinan(Science and Technology)
基金 国家自然科学基金(10271069) 陕西省自然科学基金(2004A14)
关键词 代理签名 前向安全 ECDLP 强RSA假定 proxy signature forward - secure ECDLP strong RSA assumption
  • 相关文献

参考文献11

二级参考文献48

  • 1隋爱芬,杨义先,钮心忻,罗守山.基于椭圆曲线密码的可认证密钥协商协议的研究[J].北京邮电大学学报,2004,27(3):28-32. 被引量:27
  • 2祁明,肖国镇.加强广义El Gamal型签名方案的安全性[J].电子学报,1996,24(11):68-72. 被引量:10
  • 3[1]S Kim, S Park, D Won. Pxoxy signatures, revisited. In: Proc of ICICS'97, Int'l Conf on Information and Communications Security. Berlin: Springer-Verlag, 1997. 223~232
  • 4[2]M Mambo, K Usuda, E Okamoto. Proxy signature: Delegation of the power to sign messages. IEICE Trans on Fundamentals of Electronics Communications and Computer Sciences, 1996, E79-A(9): 1338~1354
  • 5[3]M Mambo, K Usuda, E Okamoto. Proxy signatures for delegation signing operation. In: Proc of the 3rd ACM Conf on Computer and Communications Security. New York: ACM Press, 1996. 48~57
  • 6[4]B Lee, H Kim, K Kim. Strong proxy signature and its applications. The 2001 IEICE Symp on Cryptography and Information Security, Oiso, Japan, 2001
  • 7[5]K Ohta, T Okamoto. A digital multisignature scheme based on the Fiat-Shamir scheme. In: Advances in Cryptology-ASIACrypt'91. Berlin: Springer-Verlag, 1991. 139~148
  • 8[6]L Yi, G Bai, G Xiao. Proxy multi-signature scheme: A new type of proxy signature scheme. Eletronic Letters, 2000, 36(6): 527~528
  • 9[7]D Johnson, A Menezes, S Vanstone. The elliptic curve digital signature algorithm(ECDSA). 1999. http://www.certicom.com/pdfs/whitepapers/ecdsa.pdf
  • 10[8]D Brown. The exact security of ECDSA. Center for Applied Cryptographic Research, the University of Waterloo, Tech Rep: CORR 2000-54, 2000. http://www.cacr.math.uwaterloo.ca/

共引文献133

同被引文献17

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部