期刊文献+

新的改进的强代理签名方案

A new improved strong proxy signature scheme
下载PDF
导出
摘要 目的针对Lee等人(LEE B,KIM H,KIM K.Strong Proxy Signature and Its Applica-tions[A].The 2001 Symposium on Cryptography and Information Security(SCIS 2001)[C].January23-26,2001.)的强代理签名方案中的安全缺陷,给出一个新的改进方案。方法利用有限域上求解离散对数的困难问题和引入参数的方法设计新方案。结果给出了一个安全的强代理签名方案,并且推广到代理多签名方案中。结论通过安全性分析,新方案在保持原方案安全性的基础上还有效的防止了原始签名人的伪造攻击,具有强不可伪造性。 Aim In order to overcome the weakness of Lee et al's strong proxy signature scheme (LEE B, KIM H, KIM K. Strong Proxy Signature and Its Applications[A]. The 2001 Symposium on Cryptography and Information Security (SCIS 2001) [C]. January 23-26, 2001. ), a new improved strong proxy signature scheme will be proposed. Methods The new scheme is designed by means of the difficult problem of discrete logarithm on finite field and random parameter. Results A new improved strong proxy scheme is presented, and the proposed ideal is extended into proxy multi-signature scheme. Conclusion The security analyses of the new scheme show that the improved scheme could resist efficiently forgery attack of original signer as well as keeping the properties of Lee et al's scheme the proposed ideal provides strong non-forgeability.
作者 黄梅娟
出处 《宝鸡文理学院学报(自然科学版)》 CAS 2009年第2期29-31,共3页 Journal of Baoji University of Arts and Sciences(Natural Science Edition)
基金 宝鸡文理学院科研计划项目(ZK0683)
关键词 强代理签名 代理多签名 强不可伪造性 安全性分析 strong proxy signature proxy multi-signature strong unforgeability security analysis
  • 相关文献

参考文献7

二级参考文献54

  • 1杨淑娣,姚正安.一个改进的强代理签名方案[J].计算机应用研究,2004,21(8):119-121. 被引量:5
  • 2黄文平.一些不需要安全通道代理签名的分析与改进[J].计算机工程与应用,2005,41(28):127-130. 被引量:6
  • 3[1]B Lee,H Kim,K Kim. Strong Proxy Signature and its Applications[C].In:Proc of SCIS 2001,2001:603~608
  • 4[2]B Lee,H Kim, K Kim.Secure Mobile Agent using Strong Non-designated Proxy Signature[C].In:Proc ACIS,2001:474~486
  • 5[3]V Varadharajan,P Allen,S Black. An analysis of the proxy problem in distributed systems[C].In:Proc IEEE Computer Society Symp on Research in Security and Privacy,1991:255~275
  • 6[4]B C Neuman.Proxy-based authorization and accounting for distributed systems[C].In :Proc 13th International Conference on Distributed Computing Systems, 1993:283~291
  • 7[5]M Mambo,K Usuda,E Okamoto. Proxy Signature:Delegation of the Power to Sign Messages[J].IEICE Trans Fundamentals,1996;E79-A:1338~1353
  • 8[6]S Kim,S Park,D Won. Proxy Signature,revisited[C].In:Proc of ICICS′97 International Conference on Information and Communication Security, 1997: 223~232
  • 9[7]D Pointcheval,J Stern.Security proofs for signatures[C].In:Advances in Cryptology: Eurocrypt96, Berlin: springer, 1996: 387~398
  • 10[8]H Petersen,P Horster. Self-certified keys-Concepts and Applications[C].In:Proc Communications and Multimedia Security97,Chapman & Hall,1997:102~116

共引文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部