期刊文献+

基于因式分解的代理群签名方案

Proxy-multi-signature scheme based on factor polynomials
下载PDF
导出
摘要 目前基于离散对数问题(如ElGamal或Schnorr)的代理群签名算法都要进行大数的模指数运算,效率一般不高,尤其是当群用户数目很多时问题将更加严重。利用有限域中二次方程的一些特性,提出了一种基于因式分解的代理群签名方案,该算法以乘法或求逆等简单运算形式为基础,计算效率有显著提高,能够满足群用户较多时对群签名的需求。 Currently,most of the proxy-multi-signature schemes are based on discrete logarithm(such as Elgamal or Sehnorr) with low efficiency because of the complexity of module exponential computation,and the situation will become even worse when there are plenty of users.According to some useful characteristics of the 2-orders equation in finite scopes,a new type of proxy-multisignature scheme based on factor polynomials is proposed in this paper,using the computation forms such as multiply and reversion,etc.lts efficiency can be enhanced considerably,and can be utilized in the circumstance with plenty of users.
出处 《计算机工程与应用》 CSCD 北大核心 2009年第27期105-106,142,共3页 Computer Engineering and Applications
基金 教育部新世纪优秀人才支持计划项目(批准号:NCET-05-0897)
关键词 因式分解 代理签名 群签名 factor polynomials proxy-signature multi-signature
  • 相关文献

参考文献9

  • 1Liu Wenyuan,Tong Feng,Luo Yongan,et al.A proxy blind signature scheme based on elliptic curve with proxy revocation[C]// Eighth ACIS International Conference,2007:99-104.
  • 2Mambo M,Usuda K,Okamoto E.Proxy signatures:Delegation of the power to sign messages[J].IEICE Transactions on Fundamentals, 1996,E792A(9) : 1338-1354.
  • 3Wang Qin,Cao Zhenfu,Wang Shengbao.Formalized security model of multi-proxy signature schemes[C]//Proceedings of the 5th International Conference on Computer and Information Technology, 2005 : 668-672.
  • 4Elkamshoushy,AbouAlsoud D H,Madkour A K,et al.New proxy signcryption scheme with DSA verifier[C]//Radio Science Conference, 2006:1-8.
  • 5Ong H,Schnorr C P,Shamir A.An efficient signature scheme based on quadratic equations[C]//Proceedings of the 16th Annual ACM Symposium on Theory of Computing, 1984: 208-216.
  • 6Shao Zuhua.Proxy signature schemes based on factoring[J].Information Processing Letters, 2003,85 ( 3 ) : 137-143.
  • 7Xue Qingshui,Cao Zhenfu.Factoring based proxy signature schemes[J]. Journal of Computational and Applied Mathematlcs,2006,195(1): 229-241.
  • 8李子臣,戴一奇.二次剩余密码体制的安全性分析[J].清华大学学报(自然科学版),2001,41(7):80-82. 被引量:8
  • 9胡振鹏,钱海峰,李志斌.一种新的代理多重盲签名方案[J].计算机应用,2007,27(11):2718-2721. 被引量:7

二级参考文献9

共引文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部