期刊文献+

三种盲代理多重签名方案的密码分析 被引量:3

Cryptanalysis of Three Blind Proxy Multi-signature Schemes
下载PDF
导出
摘要 对三种盲代理多重签名方案进行了密码分析,在李媛等人(2003)的方案中,任何一个原始签名者可以通过伪造代理密钥的方法产生盲代理多重签名;在康莉等人(2007)的第1类盲代理多重签名方案中,攻击者不仅可以伪造任何代理签名者的有效子代理密钥,而且还可以伪造对任何消息的盲代理多重签名:在康莉等人的第2类盲代理多重签名方案中,攻击者可以通过伪造代理密钥的方法产生有效盲代理多重签名,从而证明了这3种方案都是不安全的。 Through the cryptanalysis of three blind proxy multi-signature schemes, it shows that in Li Yuan et al.'s scheme, any original signer can sign a valid blind proxy multi-signature by the means of forging proxy key, and in Kang Li et al.'s first type blind proxy multi-signature scheme, attacker not only can forge any proxy signer's proxy sub-key, but also can forge blind proxy multi-signatures on any message, and in Kang Li et al.'s second type blind proxy multi-signature scheme, attacker can sign a valid blind proxy multi-signature by the means of forging proxy key, therefore the three schemes are not secure.
出处 《电子与信息学报》 EI CSCD 北大核心 2009年第2期493-496,共4页 Journal of Electronics & Information Technology
基金 国家863计划项目(2006AA01Z419) 国家自然科学基金重大研究计划项目(90604023) 北京市自然科学基金(4072020) 河南省教育厅自然科学基础研究项目(2007120007,2008B120005) 洛阳师范学院青年基金(2008-QNJJ-012)资助课题
关键词 代理签名 盲代理签名 多重签名 盲代理多重签名 Proxy signature Blind proxy signature Multi-signature Blind proxy multi-signature
  • 相关文献

参考文献6

二级参考文献17

  • 1Mambo M, et al. Proxy signatures: Delegation of the Power to sign Messages[ J ]. IEICE Trans on Fundamentals, 1996, E79-A(9) : 1338-1354.
  • 2Mambo M,et al. Proxy Signatures[ C]. Proceeding of the 1995 Symposium on Cryptography and Information Security( SCIS 95), Inuyama, Japan, 1995, B1.1-17.
  • 3Kim S,Park S, Won D. Proxy Signatures, Revisited[ C ]. Proc of Int' 1 Conf on Information and Communications Security, LNCS1334, Springer-Verlag, 1997.223-232.
  • 4Ohta K, Okamoto T. A Digital Multi-signature Scheme Based on the Fiat-Shamir Scheme [ C ]. Advances in Crytology-ASIACYPT'91, Springer-Verlag, 1991. 139-148.
  • 5Chaum D. Blind Signatures Systems; Advances in Cryptology-CRYPT' 83[ C]. Plenum Press, New York, 1983. 153.
  • 6Camenisch J, et al. Blind Signatures Based on the Discrete Logarithm Problem [ C ]. Advances in Cryptology-EUROCRYPT'94, Lecture Notes in Computer Science v. 950, Spring-Verlag,1995.428-432.
  • 7Mambo M, Usuda K, Okamoto E. Proxy signature: delegation of the power to sign messages. EICE Trans. Fundamentals, 1996,E79-A:9: 1338- 1353.
  • 8Lee B, Kim H, Kim K. Strong proxy signature and its applications. International Conference on Information and Communication Security, Proc. of SCIS, Japan, 2001:603 - 608.
  • 9Lee B, Kim H, Kim K. Secure mobile agent using strong non-designated proxy signature Proc. ACISP, Spring-Verlag,2001, LNCS 1334:474 - 486.
  • 10Shum K, Wei Victor K. A strong proxy signature scheme with proxy signer privacy protection. http:∥www. computer. org/proceedings/wetice/1748/17480055.pdf, 2002.

共引文献31

同被引文献21

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部