期刊文献+

一些指定接收者的签名方案的分析与改进

Cryptanalysis and improvement of some signature schemes with specified receiver
下载PDF
导出
摘要 指定接收者的签名是指只有指定的人才能验证签名有效性的一类特殊签名方案.指出WANG等提出的指定接收者认证加密方案、MEI-HE提出的一些指定接收者的签名方案都无法抵抗内部伪造攻击.为克服这些方案的安全性弱点,给出了改进方案. Designated-receiver signature scheme is a kind of special signature, which the designated receiver can only check the validity of the signature. It is shown that WANG et al's authenticated encryption scheme for specified re ceiver, and MEI-HE's some signature schemes with specified receiver are all insecure against the insider forgery attack. In addition, the improved schemes are presented to overcome the weakness.
作者 谢琪
出处 《浙江大学学报(理学版)》 CAS CSCD 北大核心 2008年第5期517-520,共4页 Journal of Zhejiang University(Science Edition)
基金 973项目资助(No.2006CB30310X) 国家自然科学基金资助项目(No.10671051) 浙江省自然科学基金资助项目(No.Y105067) 浙江省教育厅科技计划项目(No.0561XP49)
关键词 数字签名 指定接收者 内部伪造攻击 digitial signature designated receiver insider forgery attack
  • 相关文献

参考文献3

二级参考文献20

  • 1NYBERG K, RUEPPEL R A. Message recovery for signature scheme based on discrete logarithm problem[J]. Designs Codes and Cryptography, 1996, 7: 61-81.
  • 2LIN C C, LAIH C S. Cryptanalysis of nyberg-rueppel's message recovery scheme[J]. IEEE Communications Letters, 2000, 4(7):231-232.
  • 3MIYAJI A. Another countermeasure to forgeries over message recovery signature[J].IEEE Trans Fundamentals, 1997, E80-A(11):2191-2200.
  • 4SHAMIR A. How to share a secret[J]. Commun ACM, 1979, 24(11): 612-613.
  • 5GENNARO R JARECKI S, KRAWCZYK H, RABIN T. Robust threshold DSS signatures[A]. Advances in Cryptology -Eurocrypt'96, Lecture Notes in Computer Science 1070[C]. Springer-Verlag, 1996. 354-371.
  • 6PEDERSEN T P. A threshold cryptosystem without a Uusted party[A]. Advances in Cryptology- Eurocrypt'91, Lecture Notes in Computer Science 547[C]. Springer-Verlag, 1991. 522-526.
  • 7HSU C L, WU T C. Authenticated encryption scheme with (t, n) shared verification[J]. IEE-Computer Digital Technology, 1998,145(2): 117-120.
  • 8WANG C T, CHANG C C, LIN C H. Genev-aliTation of threshold signature and authenticated encxyption for group communications[J].IEEE Trans Fundamentals, 2000, E83-A (6): 1228-1236.
  • 9GOLDWASSER S, MICAL S. Probabilistic encryption[J]. Journal of Computer and System Sciences, 1984, 28:270-299.
  • 10HARN L. Digital signature scheme with (t, n) shared verification based on discrete logarithm[J]. Electronics Letters, 1993, 29(24): 2094-2095.

共引文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部