期刊文献+

基于RSA密码体制的代理签名方案的设计与分析 被引量:2

Design and Analysis of Proxy Signature Scheme Based on the RSA Cryptosystem
下载PDF
导出
摘要 代理签名作为一种特殊签名体制,在电子商务和电子政务等许多领域都有着广泛的应用前景。本文在研究代理签名的基本理论基础上,基于RSA签名算法建立了一种代理签名方案,该方案具有无需以安全方式传送代理密钥和容易实现相互代理的特点。 Proxy signature has quite an abroad application.In this paper,we propose a proxy signature scheme based on RSA cryptosystem,which satisfies all the proxy requirement.This scheme doesn't need a secure channel and has the advantages of simplicity of communications.
作者 姜桦 郭永利
出处 《中国西部科技》 2009年第15期23-24,共2页 Science and Technology of West China
关键词 数字签名 代理签名 RSA Signature Proxy signature RSA crypto system
  • 相关文献

参考文献1

二级参考文献48

  • 1李继国,曹珍富,张亦辰.Improvement of M-U-O and K-P-W proxy signature schemes[J].Journal of Harbin Institute of Technology(New Series),2002,9(2):145-148. 被引量:10
  • 2CHAUM D, EVERTSE J H, GRAFF J V. An improved protocol for demonstrating possession of discrete logarithms and some generalizations[A]. Proceedings of Eurocrypt'87 [C]. 1988. 127-141.
  • 3CHAUM D, EVERTSE J H, GRAFF J V, et al. Domonstrating possession of a discrete logarithm without levealing it[A]. Proceedings of Crypt'86 [C]. 1987. 200-212.
  • 4LANDFORD S. Weakness in some threshold cryptosystems [A]. Proc of Crypto'96 [C]. 1996. 74-82.
  • 5MAMBO M, USUDA If., OKAMOTO E. Proxy signatures for delegating signing operation[A]. Proc 3rd ACM Conference on Computer and Communications Security[C]. ACM Press, 1996. 48-57.
  • 6MAMBO M, USUDA K, OKAMOTO E. Proxy signatures: delegation of the power to sign messages[J]. IEICE Trans Fundam, 1996,E79-A (9): 1338-1354.
  • 7ZHANG IC Threshold proxy signature schemes[A]. 1997 Information Security Workshop[C]. Japan, 1997. 191-197.
  • 8SUN H M. LEE N Y. HWANG T. Threshold proxy signatures[J], IEE Proc Computers & Digital Techniques, 1999, 146(5): 259-263.
  • 9KIM S, PARK S, WON D. Proxy signatures, revisited [A]. Proc ICICS'97[C]. Int Conf on Information and Communications Seurity,LNCS, Springer-Verlag, 1997. 1334: 223-232.
  • 10SUN H M. An efficient nonrepudiable threshold proxy signature scheme with known signers[J]. Computer Communications, 1999,22(8): 717-722.

共引文献55

同被引文献7

  • 1MAMBO M, USUDA K, OKAMOT AND E. Proxy signatures: Delegation of the power to sign messages[J]. IEICE Trans Fundamentals, 1996, E79-A(9): 1338 - 1354.
  • 2FOSTER I, KESSELMAN C, TSUDIK G, TUECKE S. A security architecture for computational grids[C]. Proceedings of the Fifth ACM Conference on Computers and Communications Security, 1998: 83-92.
  • 3KIM H, BAEK J, LEE B, KIM K. Secret computation with secrets for mobile agent using one-time proxy signature [C]. Proceedings of Symposium on Cryptography and Information Security (SCIS'2001), 2001: 845-850.
  • 4ZHEN-HUA LIU, YU-PU HU, etc. Provably secure multi-proxy signature scheme with revocation in the standard model [J]. Comlguter Communications. 2010(2): 121-124.
  • 5张计光,王静,尹德玉.基于ElGamal体制的代理签名[J].高等函授学报(自然科学版),2009,22(3):57-58. 被引量:3
  • 6杨利英,陈基禄,李春祥,赵利军.数字签名技术与校园网办公自动化系统[J].华北电力大学学报(自然科学版),2001,28(1):63-67. 被引量:10
  • 7杨伟强,徐秋亮.典型代理签名方案的分析与改进[J].计算机工程与应用,2004,40(9):152-154. 被引量:11

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部