期刊文献+

一种新型代理签名方案

One new proxy signature scheme
下载PDF
导出
摘要 已有的指定验证人代理签名方案一般都不具有前向安全的性质.基于一种具有前向安全性质的指定验证人代理签名方案,提出了具有新特点的代理签名方案.给出的指定验证人代理签名方案不仅满足前向安全的性质,还满足匿名性和可跟踪性. Generally the existing designated-verifier proxy signature can not provide forward-security. Based on a forward secure designated-verifier proxy signature scheme, proposed a proxy signature with new properties. So the designated-verifier proxy signature scheme presented is not only forward secure but also anonymous and traceable.
机构地区 西北大学数学系
出处 《高师理科学刊》 2009年第1期16-18,共3页 Journal of Science of Teachers'College and University
基金 陕西省自然科学基金资助项目(2007A19)
关键词 前向安全 匿名性 可跟踪性 代理签名 forward-security anonymity traceability proxy signature
  • 相关文献

参考文献5

  • 1Mambo M, Usuda K, Okamoto E. Proxy signature Delegation of the power to sign messages[C]//IEICE Trans on Fundamentals, [ S.l]: [s.n], 1996, E79-A (9) : 1 338-1 354.
  • 2Lee B, Kin H, Kim K. Strong proxy signature and it's applications[C]//Intemational Conference on Information and Communication Security. Japan: Proc of SCIS, 2001: 603-608.
  • 3Kim S, Park S, Won D. Proxy signature, revisited[C]//International Conference on Information and Communication Security. Berlin: Proc of ICICS, 1997: 223-232.
  • 4Lee B, Kim H, Kim K. Secure mobile agent using strong non-designated proxy signature[C]//Proc ACISP. Berlin: Spring-Verlag, 2001 : 474-486.
  • 5左为平,王彩芬.具有前向安全性质的指定验证人代理签名方案[J].计算机应用,2007,27(8):1898-1900. 被引量:5

二级参考文献10

  • 1ANDERSON R.Invited lecture[C]// Proceedings of 4th ACM Conference on Computer and Communications Security.New York:ACM Press,1997:1-7.
  • 2BELLARE M,MINER S K.A forward-secure digital signature[C]// Proceedings of CRYPTO'99.Berlin:Springer-Verlag,1999:431-448.
  • 3KOZLOV A,REYZIN L.Forward-secure digital signature scheme with fast key update[C]// Proceedings of Security in Communication Networks,LNCS2576.Berlin:Springer-Verlag,2002:247-262.
  • 4ITKIS G,REYZIN L.Forward-secure signature scheme with optimal signing and verifying[C]// Proceedings of 21st Annual International Cryptology Conference,LNCS2139.Berlin:Springer-Verlag,2001:332-354.
  • 5MAMBO M,USUDA K,OKAMOTO E.Proxy signatures:delegation of the power to sign messages[J].IEICE Transactions on Fundamentals,1996,E79-A(9):1338-1354.
  • 6MAMBO M,USUDA K,OKAMOTO E.Proxy signatures for delegating signing operation[C]// Proceedings of 3rd ACM Conference on Computer and Communications Security.New York:ACM Press,1996:48-57.
  • 7JAKOBSSON M,SAKO K,IMPAGLIAZZO R.Designated-verifier proofs and their applications[C]// Proceedings of Eurocrypt '96,LNCS1070.Berlin:Springer-Verlag,1996:143-154.
  • 8DAI J Z,YANG X H,DONG J X.Designated-receiver proxy signature scheme for electronic commerce[C]// Proceedings of IEEE International Conference on Systems,Man and Cybernetics.New York:IEEE Press,2003:384-389.
  • 9WANG G L.Designated-verifier proxy signatures for e-commerce[EB/OL].[2007-01-15].http://icsd.izr.a-star.edu.sg/staff/guilin/papers/ICME04-fl.pdf.
  • 10WANG G L.Designated-verifier proxy signature schemes[C]// Security and privacy in the age of ubiquitous computing,Proceedings of 20th International Conference on Information Security (IFIP/SEC 2005).Berlin:Springer-Verlag,2005:409-423.

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部