期刊文献+

新型的定向代理签名方案 被引量:1

New Designated Receiver Proxy Signature Scheme
下载PDF
导出
摘要 在Dai方案基础上,通过修改代理私钥结构,并在授权证书中增加验证人公钥信息,提出一种新方案.新方案具有强不可伪造性,原始签名人不能伪造代理人对任意消息的定向代理签名;不可滥用性,代理签名人不能对定向代理签名进行验证,从而不能滥用该签名.同时,新方案中原始签名人能指定多个验证人,在具体签名时由代理签名人和其中一个验证人交互完成定向代理签名,该签名只能为该验证人验证并接受.新方案具有较高的可控性. Based on the Dai's scheme, by the revision of proxy private key structure, and addition of the public key information of verifier in the proxy authorized certificate, it is proposed that a new digital signature scheme. The scheme has two properties: (1) Strong unforgetability, original signer cannot forge a signature signed by proxy signer; (2) Misuse, proxy signer cannot complete to verify and receive he/she make a designated receiver proxy signature, and use the signature for other usage. In the same time, multiple receiver for a signature can be designated in our scheme, during making a designated receiver proxy signature, proxy signer need interact with receiver to complete the signature, and the signature can only be received this receiver. The new scheme has high controllability.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2008年第4期42-45,共4页 Journal of Beijing University of Posts and Telecommunications
基金 国家“973计划”项目(2007CB310704) 北京市自然科学基金项目(4062025)
关键词 定向代理签名 多定向验证人 不可伪造性 滥用性 可控性 designated receiver proxy signature multi-designated receiver unforgeability misuse controllability
  • 相关文献

参考文献5

  • 1Jakobsson M, Sako K, Impagliazzo R. Designated verifier proofs and their applications [ C ] // Advances in Cryptology-EUROCRYPT 1996, LNCS 1070. Berlin: Springer-Verlag, 1996: 143-154.
  • 2杨波,肖自碧,杨义先,胡正名,钮心忻.新的强指定多个验证者签名方案[J].北京邮电大学学报,2007,30(5):1-4. 被引量:1
  • 3Mambo M, Usuda K, Okamoto E. Proxy signatures: delegation of the power to sign messages [ J ]. IEICE Trans on Fundamentals, 1996, 79(9) : 1338-1353.
  • 4Dai Jiazhu, Yang Xiaohu, Dong Jinxiang. Designatedreceiver proxy signature scheme for electronic commerce [C]//Proc IEEE Int Conf on System, Man and Cybernetics. Washington: IEEE CS Press, 2003: 384-389.
  • 5黄振杰,郝艳华,王育民.指名签名与指名代理签名[J].电子与信息学报,2004,26(12):1996-2001. 被引量:6

二级参考文献16

  • 1[1]Kim S J, Park S J, Won D H. Nominative signatures. Proc. of ICEIC'95, International Conference on Electronics, Information and Communications, Yanji, Jilin, China, August 7-12, 1995: Ⅱ-68-Ⅱ-71.
  • 2[2]Chaum D, Antwcrpcn H. Undeniable signature. Proc. of Crypto'89, LNCS 435, Berlin: SpringerVerlag, 1989:212-216
  • 3[3]Chaum D. Zcro-knowledge undeniable signature. Proc. of Eurocrypt'90, LNCS 473, Berlin:Springer-Vcrlag, 1990: 458-464.
  • 4[4]Chaum D. Designated confirmcr signatures. Proc. of Eurocypt'94, LNCS 950, Berlin: SpringerVerlag, 1994: 86-91.
  • 5[5]Kim S J, Park S J, Won D H. Zero-knowledge nominative signatures. Proc. of PragoCrypt'96, International Conference on the Theory and Applications of Cryptology, Prague, Czech, September 30-October 3, 1996: 380-392.
  • 6[6]Park H U, Lee I Y. A digital nominative proxy signature scheme for mobile communication. Proc.of ICICS'01, LNCS 2229, Berlin: Springer-Verlag, 2001: 451-455.
  • 7[7]Camenisch J. Efficient and generalized group signatures. Proc. of Eurocrypt'97, LNCS1233,Berlin: Springer-Verlag, 1997: 465-479.
  • 8[8]Schnorr C P. Efficient signature generation for smart cards. Journal of Cryptology, 1991, 4(3):161-174.
  • 9[9]Lee B C, Kim H S, Kim K J. Strong proxy signature and its applications, SCIS'01, the 2001 Symposium on Cryptography and Information Security. Oiso, Japan. January 2001: 603-608.
  • 10Jakobsson M, Sako K, Impagliazzo R. Designated verifier proofs and their applications[ C] //Advances in Cryptology-Euroerypt' 96. Berlin: Springer-Verlag, 1996 : 143- 154.

共引文献5

同被引文献13

  • 1Lim C H,Lee P J. Modified Maurer-Yacobi' s scheme and its applications[A].Beilin:Springer-Verlag,1992.308-323.
  • 2Mambo M,Usuda K,Okamoto E. Proxy signatures for delegating signing operation[A].New York:acm Press,1996.48-57.
  • 3Ai-Riyami S S,Paterson K G. Certificateless public key cryptography[A].Berlin:springer-verlag,2003.452-473.
  • 4Huang X Y,Mu Y,Susilo W. Certificateless signature revisited[A].Beilin:Springer-Verlag,2007.308-322.
  • 5Zhang Z F,Wong D S,Xu J. Certificateless public key signature:security model and efficient construction[A].Beilin:Springer-Verlag,2006.293-308.
  • 6Dai J Z,Yang X H,Dong J X. Designated-receiver proxy signature scheme for electronic commerce[A].New York:IEEE Press,2003.384-389.
  • 7Vasudeva R P,Umaprasada R B,Gowri T. ID-based directed proxy signature scheme from bilinear pairings[J].Journal of Discrete Mathematical Sciences & Cryptography,2010,(05):487-500.
  • 8Umaprasada R B,Vasudeva R P. ID-Based Directed Multi-Proxy Signature Scheme from Bilinear Pairings[J].International Journal of Computer Science and Security,2011,(01):107-117.
  • 9Gorantla M,Saxena A. An efficient certificateless signature scheme[A].Beilin:Springer-Verlag,2005.110-116.
  • 10Cha J C,Cheon J H. An Identity-based signature from Gap DiffieHellman groups[A].Beilin:Springer-Verlag,2003.18-30.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部