期刊文献+

基于双线性配对的可证安全的代理签名方案 被引量:6

A Provably-Secure Proxy Signature Scheme from Bilinear Pairings
下载PDF
导出
摘要 代理签名是指当某个签名者由于某种原因不能签名时,将签名权委托给他人替自己行使签名权的一种签名,代理签名在实际应用中有着重要的作用.提出了一个基于双线性配对的代理签名方案,并证明其在随机Oracle模型下是可证安全的.分析表明该方案比Zhang等的代理签名方案有更高的效率. A proxy signature scheme enables a proxy signer to sign messages on behalf of an original signer. Proxy signature schemes have been shown to be useful in many applications. A Proxy Signature Scheme from Bilinear Pairings is proposed. It is proved that the scheme is secure in the random oracle model and more efficient than Zhang' s scheme.
出处 《电子学报》 EI CAS CSCD 北大核心 2009年第3期439-443,共5页 Acta Electronica Sinica
基金 国家自然科学基金(No.60473091) 国家863高技术研究发展计划项目(No.2007AA01Z409)
关键词 代理签名 双线性配对 可证安全 proxy signature bilinear pairings provably-security
  • 相关文献

参考文献9

  • 1H M Sun. Design of Time-Stamed Proxy Signatures with Traceable Receivers[J]. IEEE Proc Computers & Digital Techniques, 2000,147(6) :462 - 466.
  • 2李继国,曹珍富,张亦辰.Improvement of M-U-O and K-P-W proxy signature schemes[J].Journal of Harbin Institute of Technology(New Series),2002,9(2):145-148. 被引量:10
  • 3F Zhang, K Kim. Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings[ A]. ACISP 2003 [ C ]. Berlin: Springer- Vedag, LNCS 2727,2003 : 312 - 323.
  • 4K Zhang. Threshold Proxy Signature Schemes[A]. 1997 Informarion Security Workshop[ C ]. Japan: Academic Press, 1997, 191 - 197.
  • 5L Yi, G Bai, G Xiao. Proxy multi-signature scheme: A new type of proxy signature scheme [ J ]. Electron Lett, 2000, 36 (6) :527 - 528.
  • 6R Lu,Z Cao. Designated Verifier Proxy Signature Scheme with Message Recovery[J]. Applied Mathematics and Computation, 2005,169(7) : 1237 - 1246.
  • 7F Zhang, R Safavi-Naini, C Lin. New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairings[R]. Cryptology ePrint Archive, 2003.
  • 8D Boneh,B Lynn, H Shacham. Short Signatures from the Weil Pairing[A] .Advances in Cryptology- ASIACRYPT 2001[C]. Berlin: Springer-Verlag, LNCS 2248,2001, 514 - 532.
  • 9X Huang, Y Mu, W Susilo et al. A Short Proxy Signature Scheme:Efficient Authentication in the Ubiquitotts World[ A]. Second International Symposium on Ubiquitous Intelligence and Smart Worlds ( UISW2005 ) [ C ]. Berlin: Springer-Verlag, LNCS 3823,2005,480 - 489.

二级参考文献10

  • 1ZHANGK.Thresholdproxysignatureschemes[].In formationSecurityWorkshop.1997
  • 2KIMS,PARKS,WOND.Proxysignatures,revisited[].ProcICICS′IntConfonInformationandCom municationsSecurity.1997
  • 3SUMHM,CHENBJ.Time stampedproxysignatureswithtraceablereceivers[].ProceedingsoftheNinthNationalConferenceonInformationSecurity.1999
  • 4MAMBO M,USUDA K,OKAMOTO E.Proxy signatures for delegating signing operation[].Proc rd ACM Conference on Computer and Communications Security.1996
  • 5MAMBO M,USUDA K,OKAMOTO E.Proxy signatures: Delegation of the power to sign messages[].IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences.1996
  • 6Sun H M,Lee N Y,Hwang T.Threshold Proxy Signatures [ J ][].IEE Proceedings Computers and Digital Techniques.1999
  • 7SUM H M.A efficient nonrepudiable threshold proxy signature scheme with known signers[].Computer Communications.1999
  • 8HWANG M S,LIN I C,LU E J L.A secure nonrepudiable threshold proxy signature scheme with known signers[].International Journal of Informatica.2000
  • 9Sun H M.Design of Time-Stamped Proxy Signatures with Traceable Receivers[].IEE Proceedings Computers and Digital Techniques.2000
  • 10HWANG S J,SHI C H.Specifiable proxy signature schemes[].National Computer Symposium.1999

共引文献9

同被引文献88

引证文献6

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部