期刊文献+

对YTH门限代理签名方案的分析与改进

Cryptanalysis and improvement of YTH threshold proxy signature scheme
下载PDF
导出
摘要 目的分析YANG,TZENG和HWANG2004年提出的门限代理签名方案(简称YTH方案)。方法利用有限域上离散对数困难问题和安全单向哈希函数对原方案进行改进。结果分析YTH方案发现该方案是不安全的,容易受到公钥替换攻击,故提出了一种新的安全高效的门限代理盲签名方案。结论新方案不仅避免了公钥替换攻击,而且还具有不可否认性和不可伪造性等安全门限代理签名和盲签名所具有的性质。 Aim The security of YTH scheme, which was proposed by YANG C Y, TZENG S F and HWANG M S in 2004 was analyzed. Methods The original scheme was improved on the basis of the discrete logarithm problem and the secure one-way Hash function in finite field. Results Through analyzing the security of YTH scheme, The scheme was found to be vulnerable to public-key substitute attack. A new blind threshold proxy signature scheme with high safety and efficiency is proposed. Conclusion The improved scheme can not only avoid public-key substitute attack, but also has such properties threshold proxy signature and blind signature should have as unforgeability, non- repudiation.
出处 《宝鸡文理学院学报(自然科学版)》 CAS 2009年第1期22-25,共4页 Journal of Baoji University of Arts and Sciences(Natural Science Edition)
关键词 门限代理签名 公钥替换攻击 盲签名 threshold proxy signature public-key substitute attack blind signature
  • 相关文献

参考文献11

  • 1MAMBO M, USUDA K, OKAMOTO E. Proxy signature: delegation of the power to sign messages [J]. IEICE Trans Fundamentals, 1996, E79-A (9) : 133-135.
  • 2CHAUM D. Blind signature for untraceable payments[C]. Advances in Cryptology Crypto'82, 1982 : 199-203.
  • 3YANG Cheng-ying, TZENG Shiang-feng, HWANG Min-shiang. On the efficiency of nonrepudiable threshold proxy signature scheme with known signers[J]. Systems and Software, 2004, 73(3): 507-514.
  • 4KIM S, PARK S, WON D. Proxy signatures, Revisited[C]. ICICS'97, LNCS1334, 1997: 223-232.
  • 5ZHANG K. Threshold proxy signature schemes [C]. Japan: 1997 Information Security Workshop, 1997: 191-197.
  • 6Sun H M. An efficient nonrepudiable threshold proxy signature scheme with known signers [J]. Computer Communications, 1999, 22 (8): 717- 722.
  • 7HSU C L, WU T S, WU T C. New nonrepudiable threshold proxy signature scheme with known signers[J]. Systems and Software, 2001, 58(2) : 119- 124.
  • 8HSU C L, WU T S, WU T C. Improvement of threshold proxy signature scheme[J]. Applied Mathematics and Computation, 2003, 136 (23) : 315-321.
  • 9王天银,蔡晓秋,张建中.对一种门限代理签名方案的密码分析及改进[J].计算机应用,2006,26(7):1631-1633. 被引量:4
  • 10胡江红,张建中.新的带共享解密的多重代理签密方案[J].计算机工程与应用,2008,44(15):113-115. 被引量:2

二级参考文献31

  • 1林品,李大兴.基于椭圆曲线的代理签名和门限代理签名体制[J].计算机工程与设计,2004,25(5):665-667. 被引量:5
  • 2刘俊宝,肖国镇.带门限共享解密的多代理签密方案[J].计算机工程,2006,32(23):21-23. 被引量:4
  • 3Zheng Yu-liang.Digital sigdcryption or how to achieve cost(Signature and Eneryption)<<Cost(signature)+Cost(encryption)[M].[S.l]:Springer-Verlag.1997,165-179.
  • 4Mambo M,Usuda K,Okamoto E.Proxy signature:delegation of the power to sign messages[C]//EICE Transactions on Fundamentals, 1996,79(9): 1338-1354.
  • 5Mambo M.usuda K.Okamoto E.Proxy signatures for delegating signing operation[C]//Proceedings of the 3th ACM Confrence on Computer and Communications Security,1996,48-57.
  • 6Hwang S J,Shi C H.A simple multi-proxy signature scheme[C]//Proceeding of the 10th national Confrence on Information Security.Taiwan.2000,134-138.
  • 7Li Xiang-xue,Chen Ke-fei,Li Shi-qun.Multi-proxy signature and proxy multi-signature schemes from bilinear pairings[M].[S.l]:Springer-Verlag.2004,591-595.
  • 8Zhang Zhang,Cai Mian,Qu Jin.Signcryption scheme with threshold shared unsigncryption preventing malicious reeeivers[C]//Proc of IEEE TENCON'02,2002: 196-199.
  • 9Chan W K,Wei V K.A threshohl proxy signcryption[C]//Proc of International Conference on Security and Management,Monte Carlo Resort, Las Vegas, Nevada, USA, 2002 : 24-27.
  • 10Koblitz N.Elliptic curve cryptosystems[C]//Mathematics of Computation, 1987,48 : 203-209.

共引文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部