期刊文献+

基于双线性对的门限代理签名方案的研究 被引量:2

Research on a Threshold Proxy Signature Scheme Based on Bilinear Pairing
下载PDF
导出
摘要 在一种概率签名方案的基础上进行改进,构造了基于双线性对的门限代理签名方案.双线性对又称代数曲线W eil对和Tate对,是代数几何研究中一个很重要的工具.双线性对有很多优点,如签名较短等.并且对该方案进行了详细的性能分析,结论认为,该方案是一个高效的安全的门限代理签名方案. Based on a probability signature scheme, a bilinear-pairing based threshold proxy signature scheme is proposed. Bilinear pairings, namely Weil pairings and Tate pairings, are rather important tools in algebra geometry. Bilinear pairings have lots of merits such as short signatures. And security of the scheme is analyzed. The scheme is secure and efficient.
出处 《哈尔滨理工大学学报》 CAS 北大核心 2009年第1期60-62,66,共4页 Journal of Harbin University of Science and Technology
关键词 代理签名 门限 双线性对 proxy signature, threshold, Bilinear-pairing
  • 相关文献

参考文献5

  • 1MANBO M, USUDA K, OKAMOTO E, Proxy Signature, s for Delegating Signing Operation [ C ]//Proc. 3rd ACM Conference on Computer and Communications Security, ACM Press, 1996 : 48 -57.
  • 2MANBO M, USUDA K, OKAMOTO E. Proxy Signatures: Delegation of the Power to Sign Messages [ J ]. IEICE Trans. Fundam. , 1996, E79 -A (9) :1338 -1354.
  • 3SUN H M, LEE N Y, WANG H T. Threshold Proxy signatures [ J ]. IEE proc. Computers & Digital Techniques, 1999 : 146 (5) : 259 - 263.
  • 4李继国,曹珍富.一个门限代理签名方案的改进[J].计算机研究与发展,2002,39(11):1513-1518. 被引量:26
  • 5SUN H M. A Efficient Nonrepudiable Threshold Proxy Signature Scheme with Known Signers [ J ]. Computer Communications, 1999, 22(8) :717 -722.

二级参考文献21

  • 1Nechvatal, James. Public key cryptography. In: G J Simmons ed. Contemporary Cryptology: The Science of Information Integrity. Piscatoway, N J: IEEE Press, 1991. 177~288
  • 2M Mambo, K Usuda, E Okamoto. Proxy signatures for delegating signing operation. In: Proc of the 3rd ACM Conf on Computer and Communications Security. New Delhi, India:ACM Press, 1996. 48~57
  • 3M Mambo, K Usuda, E Okamoto. Proxy signatures:Delegation of the power to sign messages. IEICE Trans on Fundam, 1996, E79-A (9): 1338~1354
  • 4K Zhang. Threshold proxy signature schemes. 1997 Information Security Workshop, Japan, 1997
  • 5H M Sun, N Y Lee, T Hwang. Threshold proxy signatures.IEE Proc-Computers & Digital Techniques, 1999, 146 (5): 259~263
  • 6S Kim, S Park, D Won. Proxy signatures, revisited. In: Proc of the Int'l Conf on Information and Communications Security (ICICS'97), LNCS 1334. Berlin: Springer-Verlag, 1997. 223~232
  • 7H M Sun. An efficient nonrepudiable threshold proxy signature scheme with known signers. Computer Communications,1999, 22(8): 717~722
  • 8M S Hwang, I C Lin, E J L Lu. A secure nonrepudiable threshold proxy signature scheme with known signers.International Journal of Informatica, 2000, 11(2): 1~8
  • 9H M Sun, B J Chen. Time-stamped proxy signatures with traceable receivers. The 9th National Conf on Information Security, Taipei, Taiwan, 1999
  • 10H M Sun. Design of time stamped proxy signatures with traceable receivers. IEE Proc-Computers & Digital Techniques, 2000, 147(6): 462~466

共引文献25

同被引文献24

  • 1LURong-xing CAOZhen-fu.A Proxy Signature Scheme as Secure as Decisional Diffie-Hellman Problem[J].Wuhan University Journal of Natural Sciences,2005,10(1):186-190. 被引量:1
  • 2李进,王燕鸣.一个可证明安全的代理签名方案[J].计算机工程,2006,32(20):13-15. 被引量:2
  • 3Mambo M,Usuda K,Okamoto E.Proxy Signature for Delegating Signing OperationfC]//Proc.of the 3rd ACM Conference on Computer and Communications Security.New York,USA:ACM Press,1996.
  • 4Kim S,Park S,Won D.Proxy Signature,Revisited[C]//Proc.ofICICS'97.Berlin,Germany:Springer-Verlag,1997.
  • 5Hu Jiangho,Zhang Jianzhong.Cryptanalysis and Improvement of a Threshold Proxy Signature Scheme[J].Computer Standards &Interfaces,2009,31(1):169-173.
  • 6Shamir A.Identity Based Cryptosystems and Signature Schemes[C]//Proc.of Cryptoloy-CRYPTO'84.Berlin,Germany:Springer-Verlag,1984.
  • 7Boneh D,Franklin M.Identity-based Encryption from the Weil Pairing[C]//Proc.of Cryptoloy-CRYPTO'01.Berlin,Germany:Springer-Verlag,2001.
  • 8Cocks C.An Identity Based Encryption Scheme Based on Qua dratic Residues[C]//Proc.of the 8th IMA International Conference on Cryptography and Coding.Berlin,Germany:Springer-Verlag,2001.
  • 9Qiu Weidong,Chen Kefei.Identity Oriented Signature Scheme Based on Quadratic Residues[J].Applied Mathematics and Computation,2005,168(1):235-242.
  • 10刘宏伟,谢维信,喻建平,赵超.一种基于身份的数字签名算法研究[J].系统工程与电子技术,2008,30(6):1159-1162. 被引量:7

引证文献2

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部