期刊文献+

新的基于身份门限代理签密方案 被引量:2

New identity-based threshold proxy signcryption scheme
下载PDF
导出
摘要 对李发根提出的基于身份门限代理签密方案进行分析,指出该门限代理签密方案存在明显错误,导致其方案不可行,并提出一个新的基于身份门限代理签密方案。该方案不但同时具有前向安全性和公开验证性,而且新方案在效率方面更具优势。 This paper analyzed the identity-based threshold proxy signeryption scheme proposed by Li Fa-gen, and pointed out that there were obvious errors in his scheme, which cause the scheme to be infeasible. Then this paper proposed a new identity-based threshold proxy signcryption scheme. This scheme not only can fulfill both public verifiability and forward security, but also has great advantages in efficiency.
作者 杨靖 余昭平
出处 《计算机应用》 CSCD 北大核心 2010年第A01期121-123,共3页 journal of Computer Applications
基金 现代通信国家重点实验室基金资助项目(9140C1102060702)
关键词 签密 基于身份 前向安全性 门限 signcryption identity-based forward security threshold
  • 相关文献

参考文献10

  • 1ZHENG YULIANG. Digital signcryption or how to achieve cost( signature & encryption < < cost(signature) + cost(encryption) [ C]// Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology, LNCS 1294. London: Springer-Verlag, 1997:165 - 179.
  • 2MAMBO M, USUDA K, OKAMOTO E. Proxy signature: Delegation of the power to sign messages[ J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 1995, E79-A(9) : 1338 - 1353.
  • 3MAMBO M, USUDA K, OKAMOTO E. Proxy signature for delegating signing operation[C]//Proceedings of the 3th ACM Conference on Communications and Computer Security. New York: ACM, 1996: 48 - 57.
  • 4HWANG S J , SHI C H . A simple multi - proxy signature scheme [ EB/OL]. [ 2009 - 09 - 20]. http:// www. im. cyut. edu. tw/ 2000html/new/Tr/2000/TR2000014. htm.
  • 5LI XIANGXUE, CHEN KEFEI, LI SHIQUN. Multi-proxy signature and proxy multi-signature schemes from bilinear pairings[ M]. Berlin: Springer-Verlag, 2004.
  • 6ZHANG ZHANG, CAI MIAN, QU JIN. Signcryption scheme with threshold shared unsigncryption preventing malicious receivers[C]// Proceedings of 2002 IEEE Region 10 Conference on Computers, Communications, Control and Power Engineering. New York: IEEE, 2002:196 - 199.
  • 7CHAN W K, WEI V K. A threshold proxy signcryption[ C]//Proceedings of International Conference on Security and Management. Las Vegas: CSREA Press, 2002:24 -27.
  • 8刘俊宝,肖国镇.带门限共享解密的多代理签密方案[J].计算机工程,2006,32(23):21-23. 被引量:4
  • 9LIBERT B , QUISQUATER J . New identity based signcryption schemes from pairings[ C]//Proceedings of 2003 IEEE Information Theory Workshop. New York: IEEE, 2003:155-158.
  • 10王萌,刘志镜.基于用户身份加密体系中的门限代理签密方案[J].计算机工程与应用,2006,42(7):126-128. 被引量:5

二级参考文献12

  • 1Jing Xu,Zhenfeng Zhang,Dengguo Feng.Identity Based Threshold Proxy Signature.Cryptology ePrint Archive,Report 2004/250,Available at http://eprint.iacr.org,2004
  • 2Byoungcheon Lee,Heesun Kim,Kwangjo Kim.Strong Proxy Signature and its Applications.SCIS2001,2001-01 ;2/2:603~608
  • 3B Libert,J-J Quisquater.New Identity Based Signcryption Schemes from Pairings[C].In:IEEE Information Theory Workshop,2003:155~158
  • 4Xiangxue Li,Kefei Chen.Identity Based Proxy-Signcryption Scheme from Pairings[C].In:Proceedings of the 2004 IEEE International Conference on Services Computing(SCC'04)
  • 5Shamir A.Identity-base Cryptosystems and Signature Schemes[C].In:Proc of Crypto'84,Lecture Notes in Computer Science,SpringerVerlag,1984; 196:47~53
  • 6Yuliang Zheng.Digital Signcryption or How to Achieve Cost(Signature & Encryption)<<Cost (Signature) +Cost (Encryption)[C].In:Proceedings of CRYPTO 1997 17th Annual International Cryptology Conference,Santa Barbara,California,USA,volume1294 of Lecture Notes in Computer Science,Springer-Verlag,1997:165~179
  • 7Mambo M,Usuda K,Okamoto E.Proxy Signatures:Delegation of the Power to Sign Message[J].IEICE Trans.on Fundam,1996,79(9):1338-1354.
  • 8Hwang S J,Shi C H.A Simple Multi-proxy Signature Scheme[C].Proceeding of the 10th National Conference on Information Security,Taiwan,2000:134-138.
  • 9Li Xiangxue,Chen Kefei,LI Shiqun.Multi-proxy Signature and Proxy Multi-signature Schemes from Bilinear Pairings[M].Springer-Verlag,2004:591-595.
  • 10Zheng Yuliang.Digital Signcryption or How to Achieve Cost (Signature and Encryption)《《Cost(signature)+Cost(encryption)[M].Springer-Verlag,1997:165-179.

共引文献7

同被引文献30

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部