期刊文献+

基于身份的指定验证者代理签名方案的改进

Improvement of Identity-based Designated-Verifier Proxy Signature Scheme
下载PDF
导出
摘要 王等人结合了代理签名方案与指定验证者签名方案的优点,利用Weil对的双线性映射,构造了一个基于身份的指定验证者代理签名方案.然而,该方案是不安全的,存在严重的安全漏洞,攻击者可以利用代理授权参数成功的伪造原始签名者.当出现争议时,可信中心无法揭示原始签名者的真正身份.为了避免这一安全隐患,提出了新的签名方案,新方案克服了原方案的不足,提高了系统的安全性. Integrating the advantages of proxy signature and designated-verifier signature scheme,wang and his partners proposed an identity-based designated-verifier proxy signature scheme,using the bilinear pairings.However,this system was insecure,having serious defect.Adversary could forge the original signer according to the delegated parameters.TC could not reveal the true original signer's identity when in dispute.To thwart this attack,a new scheme was proposed,which could resolve the security problem existing in wang and his parters's scheme and could improve the security of identity-based designated-verifier proxy signature scheme.
作者 张磊 亢保元
出处 《佳木斯大学学报(自然科学版)》 CAS 2008年第5期639-641,共3页 Journal of Jiamusi University:Natural Science Edition
关键词 代理签名 指定验证者签名 双线性对 基于身份 proxy signature designated-verifier proxy signature bilinear pairings identity-based
  • 相关文献

参考文献6

  • 1MAMBO M,USUDA K,OKAMOTO E, Proxy signatures: delegation of the Power to Sign Messages ,IEICE Trans. Fundam, E97 - A(9) (1996) : 1338 - 1354.
  • 2SHAM R A, Identity-based Cryptosystems and Signature Schemes:Advance in Cryptology-CRYPTO, LNCS [C]. [s.l.]: [s. n.], 1984:47 - 53.
  • 3JAKOB SSON M, SAKO K, MPACLI AZZO R, Designated Verifier Proofs and their Applications: proc of the EUROCRYPT'96[C], [ s. l. ] : springer, 1996:142 - 154.
  • 4DAI Jia Zhu,Yang Xiao Hu,Dong Jin xinag,Designsteed*receiver proxy Signature Scheme for Electron Commerce:proc of IEEE international Conference on Systems,Man and Cybemetic[C],[s.l.] IEEE,2003:384- 389.
  • 5Wang C, ul Lin , Designated - verifier Proxy Signatures for E - commerce:proc of the 20th intermational information Security conference (SEC2005),Chiba,Japan: Springer, 2005:409 - 423.
  • 6王波,王尚平,王晓峰,赵男,王娟.基于身份的指定验证者代理签名方案[J].计算机应用研究,2007,24(7):120-122. 被引量:5

二级参考文献10

  • 1MAMBO M,USUDA K,OKAMOTO E.Proxy signatures for delegating signing operation:proc.of the 3rd ACM Conference on Computer and Communications Security[C].[S.l.]:ACM Press,1996:48-57.
  • 2MAMBO M,USUDA K,OKAMOTO E.Proxy signatures:delegation of the power to sign messages[J].IEICE Trans.Fundam.,1996,E79-A(9):1338-1354.
  • 3JAKOBSSON M,SAKO K,IMPAGLIAZZO R.Designated verifier proofs and their applications:proc.of the EUROCRYPT'96[C].[S.l.]:Springer,1996:142-154.
  • 4SHAMIR A.Identity-based cryptosystems and signature schemes:Advances in Cryptology-CRYPTO,LNCS[C].[S.l.]:[s.n.],1984:47-53.
  • 5DAI Jiazhu,YANG Xiaohu,DONG Jinxiang.Designated-receiver proxy signature scheme for electronic commerce:proc.of IEEE International Conference on Systems,Man and Cybernetics[C].[S.l.]:IEEE,2003:384-389.
  • 6WANG Guilin.Designated-verifier proxy signatures for e-commerce:proc.of the 20th International Information Security Conference (SEC2005)[C].Chiba,Japan:Springer,2005:409-423.
  • 7SILVEMAN J H.The arithmetic of elliptic curves[M].New York:Springer-Verlag,1986:96-99.
  • 8BONEH D,FRANKLIN M.Identity-based encryption from the weil pairing:Advance in Cryptology-CRYPTO2001[C].New York:Springer-Verlag,2001:341-346.
  • 9PATERSON K.ID-based signatures from pairing on elliptic curves[EB/OL].(2002-10-01).http://epring.iacr.org.
  • 10SUSILO W,ZHANG Fangguo,MU Yi.Identity-based strong designated verifier signature schemes:ACISP2004,LNCS 3108[C].[S.l.]:[s.n.],2004:313-324.

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部