期刊文献+

具有消息恢复的代理多重签名方案 被引量:2

Proxy multi-signature scheme with message recovery
下载PDF
导出
摘要 基于离散对数提出了一个具有消息恢复的代理多重签名方案。任何验证者都可以恢复消息并验证签名,因此减少了传输信息本身所需要的成本;验证者可根据实际情况,实施一次或两次验证,从而实现了双重安全保护机制。 A new proxy multi-signature scheme with message recovery is proposed based on discrete logarithms.ln this scheme,every verifier can recover the message and verify the signature,so the scheme can reduce the communication costs;The verifier can verify the signature one time or twice by the actual situation,so it can realize a kind of scheme with the dual security of protection.
出处 《计算机工程与应用》 CSCD 北大核心 2009年第5期108-109,124,共3页 Computer Engineering and Applications
基金 国家自然科学基金(No.10571112) 陕西省自然科学基础研究计划(No.2007A06)~~
关键词 代理签名 消息恢复 代理多重签名 离散对数 proxy signature message recovery multi-signature discrete logarithms
  • 相关文献

参考文献11

  • 1Mambo M,Usuda K,Okamoto E.Proxy signature:delegation of the power to sign messages[J].IEICE Trans Fundam, 1996,E79-A9: 1338-1354.
  • 2HSU C L,WU TS,WUT C,New non-repudiable threshold proxy signature scheme with known signers[J].The Journal of System and Software, 2001,58(2) : 119-124.
  • 3Sun H M,Lee N Y,Hwang T.Threshold proxy signatures[J].IEEE Proceedings Computers & Digital Techniques 1999,146(5) :259-263.
  • 4王晓明,陈火炎,符方伟.前向安全的代理签名方案[J].通信学报,2005,26(11):38-42. 被引量:35
  • 5Hwang S J,SHI C H.A simple muli-proxy signature scheme:Pro of 10th National Conference on Information Security[C].Hualien, Taiwan: Roc, 2000:134-138.
  • 6祁明,L.Harn.基于离散对数的若干新型代理签名方案[J].电子学报,2000,28(11):114-115. 被引量:67
  • 7Yi Li -Jiang, Bai Guo -qing,Xiao guo-zhen.Proxy muhi -signature scherne:A new type of proxy signature scheme[J].Electronics Letter, 2000,36(6) : 527-528.
  • 8Nyberg K,Rueppel R A.Message recovery for signature schemes based on the discrete logarithm[C]//Advances in Cryptology-Eurocrypt'94.Berlin: Springer-Verlag, 1994:175-190.
  • 9Chen Ke-fei.Signature with message recovery[J].Electronics Letters, 1998,34(2) : 1934.
  • 10李子臣,杨义先.具有消息恢复的数字签名方案[J].电子学报,2000,28(1):125-126. 被引量:28

二级参考文献22

  • 1祁明,肖国镇.加强广义El Gamal型签名方案的安全性[J].电子学报,1996,24(11):68-72. 被引量:10
  • 2Chi Sung Laih,IEICE Trans,1997年,E80A卷,1期,46页
  • 3Chi Sung Laih,LNCS 1029,1996年,228页
  • 4He J,IEEE Pro Comput Digit M,1994年,142卷,4期,249页
  • 5MAMBO M, USUDA K, OKAMOTO E. Proxy signature: delegation of the power to sign messages[J]. IEICE Trans Fundamentals, 1996,79(9): 1338-1354.
  • 6MAMBO M, USUDA K, OKAMOTO E. Proxy signature for delegating signing operation[A]. Proc 3rd ACM Conference on Computer and Communications Security[C]. New Delhi: ACM Press,1996. 48-49.
  • 7YI L J, BAI G Q, XIAO G Z. Proxy multi-signature scheme: a new type of proxy signature scheme[J]. Electronics Letters, 2000, 36(6):527-528.
  • 8ZHANG K. Non-repudiable proxy signature schemes[EB/OL], http://citeseer.nj.nec.com/360090, html, 1999.
  • 9ZHANG K. Threshold proxy signature schemes[A]. 1997 Information Security Workshop[C]. Japan, Springer-Verlag, 1997. 191-197.
  • 10KIM S, PARK S, WON D. Proxy signature, revisited[A]. Proceedings ICICS'97, Lecture Notes in Computer Science 1334[C]. Berlin:Springer-Verlag, 1997. 223-232.

共引文献127

同被引文献9

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部