期刊文献+

有代理的门限签名方案 被引量:2

Threshold signature with proxy scheme
下载PDF
导出
摘要 在门限代理签名方案中加入有代理的思想,提出了一个有代理的门限签名方案,实现了原始签名者与代理签名者联合进行签名,这就解决了当一部分原始签名者不能履行签名义务时,这部分原始签名者可以委托他们的代理签名者与剩下的原始签名者一起进行签名。这个方案也是门限代理签名的一个推广,它可以在更广的范围内得到应用。 This paper proposes a threshold signature with proxy scheme,which adds the idea of signature with proxy to threshold signature scheme.It makes the original signers together with the proxy signers to sign the massage.This can solve the problem that when a part of original signers can't participate in signature and these original signers can delegate their signing power to proxy signers,and they can sign the massage together with the remainder of original signers.This scheme is the generalization of threshold proxy signature scheme and it can use in the wider scope.
作者 于静 李志慧
出处 《计算机工程与应用》 CSCD 北大核心 2009年第13期127-129,169,共4页 Computer Engineering and Applications
基金 国家自然科学基金No.10571112 陕西省自然科学基础研究计划(2007A06)资助~~
关键词 有代理的签名方案 门限签名 离散对数 Schnorr方案 Lagrange插值公式 the signature with proxy scheme threshold signature discrete logarithm Schnorr scheme Lagrange interpolation
  • 相关文献

参考文献7

  • 1Mambo M,Uauda K,Okamoto E.Proxy signatures:delegation of the power to sign message[J].EICE Transactions on Fundamentals E79-A,1996(9):1338-1354.
  • 2Huang H F,Chang C C.A novel efficient(t,n) threshold proxy signature scheme[J].Information Sciences,2006,176:1338-1349.
  • 3Hsu C L,Wu T S,Wu T C.Improvement of threshold proxy signature scheme[J].Applied Mathematics and Computation 2003,136:315-321.
  • 4Hwang M S,Lin I C,Eric J L Lu.A secure nonrepudiable threshold proxy signature scheme with known signers[J].International Journal of Informatics,2000,11:1-8.
  • 5Sun H M.An efficient nonrepudiable threshold proxy signature scheme with known signers[J].Computer Communications,1999,22(8):717-722.
  • 6Sun H M,Lee N Y,Hwang T.Threshold proxy signatures[J].IEEProceedings-Computers and Digital Techniques,1999,146 (5):259-263.
  • 7Tzeng S F,Yang C Y,Hwang M S.A nonrepudiahle threshold multi-proxy multi-signature scheme with shared veriflcation[J].Future Generation Computer Systems,2004,20(5):887-893.

同被引文献20

  • 1王晓明,陈火炎,符方伟.前向安全的代理签名方案[J].通信学报,2005,26(11):38-42. 被引量:35
  • 2蒋瀚,徐秋亮,周永彬.基于RSA密码体制的门限代理签名[J].计算机学报,2007,30(2):241-247. 被引量:13
  • 3鲁荣波,何大可,王常吉.一种门限代理签名方案的分析与改进[J].电子学报,2007,35(1):145-149. 被引量:13
  • 4Mambo M, Usuda K, Okamoto E. Proxy Signature: Delegation of the Power to Sign Message[J]. IEICE Transactions on Fundamentals, 1996, E79-A(9): 1338-1354.
  • 5Huang Huifeng, Chang C C. A Novel Efficient (t,n) Threshold Proxy Signature Scheme[J]. Information Sciences, 2006, 176(10): 1338-1349.
  • 6Kim S, Park S, Won D. Proxy Signature, Revisited[C]//Proc. of International Conference on Information and Communication Security. Berlin, Germany: Springer-Verlag, 1997: 223-232.
  • 7Mambo M,Usuda K,Okamoo E.Proxy signatures:delegation of the power to sign messages[J].IEICE Transactions on Fundamentals,1996,E79-A:1338-1354.
  • 8Lee B,Kim H,Kim K.Strong proxy signature and its applications[C]//Proceedings of SCIS2001,Oiso,Japan,2001:603-608.
  • 9Shamir A.Identity based cryptosystems and signature schemes[C]//Blakely G R,Chaum D.Proceedings of Crypto1984,California,USA,1984,196:47-53.
  • 10Huang H F,Chang C C.A novel efficient(t,n)threshold proxy signature scheme[J].Information Sciences,2006,176:1338-1349.

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部