期刊文献+

基于身份的无可信私钥产生中心的代理签名方案的改进

Improvement of ID-based proxy signature scheme without trusted PKG
下载PDF
导出
摘要 发现左卫平等人提出的基于身份无可信私钥产生中心的指定验证人代理签名方案存在一个安全漏洞,即代理人根据原始签名人的授权可计算出原始人的私钥,从而可直接伪造原始签名人的签名或任何授权。针对此方案的缺陷,提出了改进措施,分析表明改进后的方案是安全的,可抵抗代理人恶意的伪造攻击,还可以抵抗代理人和私钥产生中心联合的恶意攻击。 A security defect was detected in ZUO Wei-ping's ID-based designated verifier proxy signature scheme without trusted PKG. The proxy signer can compute the original signer's private key after receiving his authorization. An improved scheme was presented to overcome the above defect. Analysis indicates that it is secure against the proxy signer's forgery attack, and even against the malice attack of the ally of the proxy signer and the PKG.
作者 徐青慧 谢琪
出处 《计算机应用》 CSCD 北大核心 2008年第12期3208-3210,共3页 journal of Computer Applications
基金 国家自然科学基金资助项目(10671051) 浙江省自然科学基金资助项目(Y105067)
关键词 基于身份 代理签名 指定验证人 私钥产生中心 安全性分析 ID-based proxy signature designated-verifier Private Key Generator (PKG) security analysis
  • 相关文献

参考文献23

  • 1MAMBO M, USUDA K, OKAMOTO E. Proxy signature: Delegation of the power to sign messages [ J]. IEICE Transactions Fundamentals, 1996, E79-A(9) : 1338 - 1353.
  • 2ZHANG K. Non-repudiable proxy signature schemes [ M]. [ S. l.] : Manuscript, 1997.
  • 3ZHANG K. Threshold Proxy signature schemes [ C]//Proceeding of the 1997 Information Seeurity Workshop. Ishikawa, Berlin: Springer-Verlag, 1998:191-197.
  • 4SUN H M, LEE N Y, HWANG T. Threshold proxy signature seherues [ J]. IEE Proc Computers & Digital Techniques, 1999, 146(5), 259 - 263.
  • 5KIM S, PARK S, WON D. Proxy signatures revisited [C]// Proceedings of the First International Conference on Information and Communication Seeurity, LNCS 1334. Berlin: Spdnger-Verlag, 1997:223-232.
  • 6SUN H M. An efficient nonrepudiable threshold proxy signature scheme with known signers[ J]. Computer Communications, 1999, 22(8) : 717 - 722.
  • 7SUN H M, CHEN B J. Time-stamped proxy signatures with traceable receivers [ C]//Proceedings of the Ninth National Conference on Information Security. Taipei, Taiwan: [ s. n: ], 1999:247 - 253.
  • 8伊丽江,白国强,肖国镇.代理多重签名:一类新的代理签名方案[J].电子学报,2001,29(4):569-570. 被引量:70
  • 9祁明,L.Harn.基于离散对数的若干新型代理签名方案[J].电子学报,2000,28(11):114-115. 被引量:67
  • 10XU JING, ZHANG ZHEN-FENG, FENG DENG-GUO. ID-based proxy signature using bilinear pairings [ C]// International Workshop on Information Assurance in Distributed Systems, LNCS 3759. Berlin: Springer-Verlag, 2005:359-367.

二级参考文献35

  • 1祁明,肖国镇.加强广义El Gamal型签名方案的安全性[J].电子学报,1996,24(11):68-72. 被引量:10
  • 2张学军,王育民.基于身份无可信中心的盲签名和代理签名[J].计算机应用,2006,26(10):2307-2309. 被引量:7
  • 3张学军,王育民.新的基于身份无可信中心的盲签名和代理签名[J].计算机工程与应用,2007,43(1):142-144. 被引量:12
  • 4[1]M.Mambo,K.Usuda,and E.Okamot.Proxy signatures:Delegation of the power to sign messages [J].IEICE Trans.Fundamentals,1996,E79-A(9):1338-1354.
  • 5[2]S.Kim,S.Park and D.Won proxy signatures,revisited [A].Proc.of ICICS'97,International Conference on Information and Communications Security [C],LNCE,1334,1997:223-232.
  • 6[3]K.Ohta and t.Okamoto.A digital multisignature scheme based on the Fiat-Shamir scheme [A].Advances in Cryptology—ASIACRYTP'91 [C]:.139-148.
  • 7Desmedt Y, Frankel Y. Shared generation of authenticators. In:Proceedings of Crypto'91, Santa Barbara, California, USA, 1991.457~469
  • 8Wang C T, Lin C H, Chang C C. Threshold signature schemes with traceable signers in group communications. Computer Communications,1998,21(8): 771~776
  • 9Harn L. Group-oriented(t,n) threshold digital signature scheme and digital multisignature. IEE Proceedings of Computers and Digital and Technique,1994,141(5):307~313
  • 10Rosario G, Stanislaw J, Hugo K. Robust threshold DSS signatures. Information and Computation,2001,164(1):54~84

共引文献191

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部