期刊文献+

改进的门限多代理多重共享验证签名方案 被引量:2

Improved Threshold Multi-proxy Multi-signature Scheme with Shared Verification
下载PDF
导出
摘要 针对Tzeng和Hsu等的签名方案存在的秘密泄露及不能实现共享验证问题,通过提高签名和验证秘密多项式的次数,给出一个改进方案。该方案能有效抵抗合谋攻击,实现签名的共享验证。利用拉格朗日插值等相关知识证明了该方案的正确性。 With the problems of secreat leak and unrealized shared verification in Tzeng's paper and Hsu's, an improved scheme is proposed, by increasing signature and verification secret polynomials' degree. This scheme can resist conspiracy attack effectively and actualize shared verification, as it has been justified using Lagrange interpolation and interrelated knowledge.
机构地区 东北大学理学院
出处 《计算机工程》 CAS CSCD 北大核心 2008年第23期170-172,共3页 Computer Engineering
基金 辽宁省自然科学基金资助项目(20042019)
关键词 数字签名 门限代理签名 共享验证 合谋攻击 digital signature threshold proxy signature shared verification conspiracy attack
  • 相关文献

参考文献8

  • 1Zhang Kan. Threshold Proxy Signature Scheme[C]//Proceedings of the 1997 Information Security Workshop. Tokyo, Japan: [s. n.], 1997-09: 191-197.
  • 2Kim S, Park S, Won D. Proxy Signature, Revisited[C]//Proc. of ICICS'97. Berlin, Germany: Springer, 1997: 223-232.
  • 3Sun Hung-Min. An Efficient Nonrepudiable Threshold Proxy Signature Scheme with Known Signers[J]. Computer Communication, 1997, 22(8): 717-722.
  • 4Hsu Chien-Lung, Wu Tzong-Sun, Hsu Tzong-Chen. New Nonrepudiable Threshold Proxy Signature Scheme with Known Signers[J]. Journal of Systems and Software, 2001, 58(9): 119-124.
  • 5王晓明,符方伟.指定验证人的(t,n)门限代理签名方案[J].软件学报,2005,16(6):1190-1196. 被引量:8
  • 6王晓明,张震,符方伟.一个安全的门限代理签名方案[J].电子与信息学报,2006,28(7):1308-1311. 被引量:7
  • 7Tseng S F, Yang C Y, Hwang M S. A Nonrepudiable Threshold Muti-signature Multi-proxy Multi-signature Scheme with Shared Verification[J]. Future Generation Computer Systems, 2004, 20(5): 887-893.
  • 8Hsu C L, Tsai K Y, Tsai P L. Cryptanalysis and Improvement of Nonrepudiable Threshold Multi-proxy Multi-signature Scheme with Shared Verification[J]. Information Sciences, 2007, 177(2): 543-549.

二级参考文献15

  • 1Kim S, Park S, Won D. Proxy signature, revisited, ICICS'97,Lecture Notes in Computer Science, Springer, Berlin,1997, 1334:223 - 232.
  • 2Zhang K. Threshold proxy signature scheme. 1997 Information Security Workshop, Tokyo, Japan, September, 1997:191 - 197.
  • 3Sun H M. An efficient nonrepudiable threshold proxy signature scheme with known signers. Computer Communication. 1997, 22(8):717- 722.
  • 4Hwang M S, Lu J L, Lin L C. A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem. IEEE Trans.on Knowledge and Data Engineering, 2003,15(6): 1552 - 1560.
  • 5Sun, H M Lee, N Y Hwang, T. Threshold proxy signatures, IEE Proc- Computers and Digital Techniques, 1999, 146(5):259 - 263.
  • 6Hsu C L, Wu T S, Wu T C. New nonrepudiable threshold proxy signature scheme with known signers. Journal of Systems and Software, 2001, 58 (9): 119 - 124.
  • 7Lee N Y, Hwang T, Wang C H. On Zhang's nonrepudiable proxy signatures. ACISP'98, Lecture Notes in Computer Science,Springer, Berlin, 1998:414 - 422,
  • 8Pedersen, Distributed provers with applications to undeniable signatures. Proc, Eurocrypt'91, Lecture Notes in Computer Science, Sprinter, Berlin, 1991, 547:221 - 238.
  • 9Hwang MS, Lu JL, Lin IC. A practical (t,n) threshold proxy signature scheme based on the RSA cryptosystem. IEEE Trans. on knowledge and data engineering, 2003,15(6): 1552-1560.
  • 10Sun HM. An efficient nonrepudiable threshold proxy signature scheme with known signers Computer signature scheme with known signers. Computer Communications, 1999,22(8):712-722.

共引文献12

同被引文献19

  • 1金永明,徐秋亮,陈泽雄.椭圆曲线上的多级代理签名方案[J].计算机工程与应用,2006,42(20):98-102. 被引量:7
  • 2蔡庆华,陈文莉.基于双线性对的代理签名[J].计算机技术与发展,2006,16(9):230-232. 被引量:2
  • 3蔡勉,康莉.一种安全的多级代理签名方案[J].中国科学院研究生院学报,2006,23(5):653-659. 被引量:9
  • 4蔡庆华.基于双线性对的代理盲签名[J].计算机技术与发展,2006,16(11):166-167. 被引量:2
  • 5蔡勉,康莉.一种防抵赖的多级代理签名方案[J].北京工业大学学报,2006,32(10):953-957. 被引量:7
  • 6Mambo M,Usuda K,Okamoto E.Proxy Signature:Delegation of the Power to Sign Messages[J].IEICE Trans.on Fundamentals of Electronics Communications and Computer Sciences,1996,79(9):1338-1354.
  • 7Mambo M,Usuda K,Okamoto E.Proxy Signatures for Delegation Signing Operation[C]//Proc.of the 3rd Conference on Computer and Communications Security.New York,USA:ACM Press,1996.
  • 8Shao Zuhua.Proxy Signature Schemes Based on Factoring[J].Information Processing Letter,2003,85(3):137-143.
  • 9Mambo M, Usuda K,Okamoto E. Delegation of the power to sign massages[ J ]. IEICE Transactions on Fundamemals of Electronics Communications and Computer Sciences, 1996, E79 - A(9) : 1338 - 1354.
  • 10Ohta K,Okamoto T.A digital multil-signature scheme based on the Fiat- Shamir scheme[ C] //Advances in Crytology- ASIACYPT' 91. [s. l. ] : Springer- Verlag, 1991 : 139 - 148.

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部