期刊文献+

结合前向安全的椭圆曲线代理签名

An Elliptic curve proxy signature combines the forward security
下载PDF
导出
摘要 椭圆曲线代理签名是代理签名中的研究热点。通过对椭圆曲线代理签名体制及前向安全技术进行了研究,提出了一种结合前向安全的椭圆曲线代理签名算法,该算法利用椭圆曲线代理签名的安全性和前向安全机制来保证代理签名的安全性,并且还可预防人为私钥泄露对系统安全造成的威胁。 The Elliptic curve proxy signature is the research hot of the proxy signature. This paper presents the basic concept and related knowledge of elliptic curve proxy signature,discusses the present situation of the forward security. It gives an Elliptic curve proxy signature combines the forward security algorithm to be aimed at the Elliptic curve proxy signature which is one of the Elliptic curve s keys,the algorithm uses the security of Elliptic curve proxy signature and the forward security to guarantee the security of the proxy signature and achieves preventing artificial private key leak.
出处 《微计算机信息》 2009年第36期74-75,32,共3页 Control & Automation
基金 基金申请人:徐江峰 项目名称:基于连续混沌系统的图像加密技术研究 基金颁发部门:河南省教委自然科学基金(2006520014)
关键词 前向安全 椭圆曲线 代理签名 forward security the Elliptic curve proxy signature
  • 相关文献

参考文献6

  • 1M. Mambo, K.Usuda and E. Okamoto. Proxy signatures for delegating signing operation[C].In Proceedings of the 3rd ACM Conference on Computer and Communications Security (CCS), 48C57. ACM,1996.
  • 2MAMBO M, USUDA K,OKAMOTO E. Proxy signatures: delegation of the power to sing messages [J].IEICE Trans Fundam,1996, E79-A (9):1338-1354.
  • 3杨义先珊伟,钮心祈著.现代密码新理论[M].北京:科学出版社.2002:PP.106-157.
  • 4Mihir Bellare and Sara K. Miner, "A Forward-Secure Digital Signature Scheme"[R],In Proceedings Of Crypto99,Lecture Notes in Computer Science,vol1666, pp. 431-448, Springer-Verlag,1999.
  • 5王晓明,陈火炎,符方伟.前向安全的代理签名方案[J].通信学报,2005,26(11):38-42. 被引量:35
  • 6张守忠.代理签名者身份保护的代理签名体制[J].微计算机信息,2006(09X):74-75. 被引量:7

二级参考文献12

  • 1杨磊,周加法,李益发.凭证型代理签名体制的安全性研究[J].微计算机信息,2005,21(12X):52-54. 被引量:9
  • 2MAMBO M, USUDA K, OKAMOTO E. Proxy signature: delegation of the power to sign messages[J]. IEICE Trans Fundamentals, 1996,79(9): 1338-1354.
  • 3MAMBO M, USUDA K, OKAMOTO E. Proxy signature for delegating signing operation[A]. Proc 3rd ACM Conference on Computer and Communications Security[C]. New Delhi: ACM Press,1996. 48-49.
  • 4YI L J, BAI G Q, XIAO G Z. Proxy multi-signature scheme: a new type of proxy signature scheme[J]. Electronics Letters, 2000, 36(6):527-528.
  • 5ZHANG K. Non-repudiable proxy signature schemes[EB/OL], http://citeseer.nj.nec.com/360090, html, 1999.
  • 6ZHANG K. Threshold proxy signature schemes[A]. 1997 Information Security Workshop[C]. Japan, Springer-Verlag, 1997. 191-197.
  • 7KIM S, PARK S, WON D. Proxy signature, revisited[A]. Proceedings ICICS'97, Lecture Notes in Computer Science 1334[C]. Berlin:Springer-Verlag, 1997. 223-232.
  • 8ANDWESON R. Invited lecture[EB/OL], http://citeseer. nj.nec.com/anderson06forwarssecure.html, 1997.
  • 9KOZLOY A, REYZIN L. Forward secure signature with fast keyupdate[EB/OL], http://cit eseer.nj .nec.com/kozlov02forwarssecure.html,1998.
  • 10Jia-zhu Dai,Xiao-Hu Yang Jin-Xiang Dong Designated-Receiver Proxy Signature Scheme For Electronic Commerce. IEE,2003: 384-389.

共引文献40

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部