期刊文献+

基于双线性对的代理签名的研究与应用 被引量:2

Proxy signature based on bilinear paring
下载PDF
导出
摘要 作为信息安全的核心技术之一的数字签名在电子商务和电子政务中起着重要的作用。代理签名作为数字签名中一种重要的分支被广泛地研究和应用。双线性对是近几年发展起来的构造密码体制的一个重要工具,因此一种基于双线性对的代理签名方案被提出来。这种方案极大地提高了数字签名的安全性以及实现速度。 As one of the kernel techniques in information security,the digital signature plays an important role in electronic commerce and electronic goveInment affair.The proxy signature,an important branch of the digital signature,has been widely studied and utilized.A proxy signature scheme is proposed based on bilinear paring which is an available tool in constructing eryptographic protocols.By using this scheme,the security and the speed of digital signature can he greatly improved.
作者 居上游 戎丹
出处 《计算机工程与应用》 CSCD 北大核心 2008年第29期128-130,共3页 Computer Engineering and Applications
关键词 双线性对 代理签名 数字签名 bilinear paling proxy signature digital signature
  • 相关文献

参考文献13

  • 1Mambo M,Usuda K,Okamoto E.Proxy signature for delegating signing operation[C]//Proc 3rd ACM Conference on Computer and Communication Security.[S.l]: ACM Press, 1996:48-57.
  • 2Zhang K.Threshold proxy signature schemes [C]//1997 Information Security Workshop, 1997: 191-197.
  • 3Sun H M,Lee N Y,Hwang T.Threshold proxy signatures[J].IEE Proc Computers & Digital Techniques, 1999,146(5) :259-263.
  • 4Kim S,Park S,Won D.Proxy signatures,revisited[C]//LNCS:Int Conf on Information and Communication Security.Springer-Verlag,1997, 1334 : 223-232.
  • 5李继国,曹珍富.一个门限代理签名方案的改进[J].计算机研究与发展,2002,39(11):1513-1518. 被引量:26
  • 6Sun H M.An efficient nonrepudiable threshold proxy signature scheme with known signers[J].Computer Communications, 1999,22 (8):717-722.
  • 7Hwang M S,Lin I C,Lu E J.A secure nonrepudiable threshold proxy signature scheme with known signers[J].International Journal of Informatica, 2000,11 ( 2 ) : 1-8.
  • 8Sun H M,Chen B J.Time-stamped proxy signatures with traceable receivers[C]//Proceedings of the ninth National Conference on Information Security, 1999:247-253.
  • 9Sun H M.Design of time-stamped proxy signatures with traceable receivers[J].IEE Proc Computer & Digital Techniques,2000,147(6): 462-466.
  • 10Boneh D,Franklin M.ldentity-based encryption from the weil pairing[J].SIAM J of Computing, 2003,32(2) : 586-615.

二级参考文献21

  • 1Nechvatal, James. Public key cryptography. In: G J Simmons ed. Contemporary Cryptology: The Science of Information Integrity. Piscatoway, N J: IEEE Press, 1991. 177~288
  • 2M Mambo, K Usuda, E Okamoto. Proxy signatures for delegating signing operation. In: Proc of the 3rd ACM Conf on Computer and Communications Security. New Delhi, India:ACM Press, 1996. 48~57
  • 3M Mambo, K Usuda, E Okamoto. Proxy signatures:Delegation of the power to sign messages. IEICE Trans on Fundam, 1996, E79-A (9): 1338~1354
  • 4K Zhang. Threshold proxy signature schemes. 1997 Information Security Workshop, Japan, 1997
  • 5H M Sun, N Y Lee, T Hwang. Threshold proxy signatures.IEE Proc-Computers & Digital Techniques, 1999, 146 (5): 259~263
  • 6S Kim, S Park, D Won. Proxy signatures, revisited. In: Proc of the Int'l Conf on Information and Communications Security (ICICS'97), LNCS 1334. Berlin: Springer-Verlag, 1997. 223~232
  • 7H M Sun. An efficient nonrepudiable threshold proxy signature scheme with known signers. Computer Communications,1999, 22(8): 717~722
  • 8M S Hwang, I C Lin, E J L Lu. A secure nonrepudiable threshold proxy signature scheme with known signers.International Journal of Informatica, 2000, 11(2): 1~8
  • 9H M Sun, B J Chen. Time-stamped proxy signatures with traceable receivers. The 9th National Conf on Information Security, Taipei, Taiwan, 1999
  • 10H M Sun. Design of time stamped proxy signatures with traceable receivers. IEE Proc-Computers & Digital Techniques, 2000, 147(6): 462~466

共引文献25

同被引文献15

  • 1赵泽茂.基于椭圆曲线的代理盲签名方案[J].河海大学学报(自然科学版),2006,34(3):329-332. 被引量:5
  • 2李进,王燕鸣.一个可证明安全的代理签名方案[J].计算机工程,2006,32(20):13-15. 被引量:2
  • 3Mambo M, Usuda K, Okamoto E.Proxy signatures for delegating signing operation[C]//Proceedings of the 3rd ACM Conference on Computer and Communications Security(CCS), 1996: 48-57.
  • 4Lee B,Kim H,Kim K.Strong proxy signature and its applications[C]//Proceedings of SCIS, Japan, 2001,2/2: 603-608.
  • 5Wang G,Bao F,Zhou J,et al.Security analysis of some proxy signatures[C]//ICISC 2003.Springer-Verlag,2004,2971:305-319.
  • 6Boldyreva A, Palacio A, Warinsehi B.Secure proxy signature Schemes for delegation of signing rights Report 2003/096[R/OL]. http://eprint.iacr.org.
  • 7Zhang F, Safavi-Naini R, Susilo W, An efficient signature scheme from bilinear pairings and its applications[C]//PKC 2004, Singapore.Springer-Verlag, 2004.
  • 8Mambo M, Usuda K, Okamoto E. Proxy signature for delegating signing opreation[C]//Proceeding of the 3rd AC'M Conference on computer and communication security, 1996:48-57.
  • 9Anderson R. Two Remarks on Public Key Cryptology[C] ffProceeding of the 4th ACM Computer and Communication Securi- ty, 1997.
  • 10Boneh D, Lynn B, Shacham H. Short Signatures from the Well Pairing[C]//Proceeding. of ASIACRYPT'01, 2001:514- 532.

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部