期刊文献+

两类盲代理多重签名方案的安全性分析和改进 被引量:3

Security Analysis and Improvement of Two Classes of Blind Proxy Multi-signature Schemes
下载PDF
导出
摘要 针对具有盲代理签名体制和代理多重签名体制双重性质的两类盲代理多重签名方案提出抵抗原始签名人及任何人的子代理密钥2类伪造攻击。为抵抗这2种攻击,对盲代理多重签名方案进行改进,提出安全的盲代理多重签名方案。结果证明改进的方案不仅可有效抵抗2种攻击,同时具有更高的效率,计算量更少,代理签名长度更短。 Two forgery attacks are presented on two classes of blind proxy multi-signature schemes which have the properties of blind proxy signature schemes and proxy multi-signature schemes.In order to resist the two attacks,two classes of improved blind proxy multi-signature schemes are proposed.Result is proved that improved blind proxy multi-signature schemes not only resist the above two attacks,but also are more efficient than others.The computation cost is less and the length of proxy signature is shorter.
出处 《计算机工程》 CAS CSCD 北大核心 2010年第16期129-130,134,共3页 Computer Engineering
基金 上海市教育委员会科研创新基金资助项目(10YZ201) 上海高校选拔培养优秀青年教师科研专项基金资助项目
关键词 密码学 盲代理多重签名 密码分析 cryptography blind proxy multi-signature cryptanalysis
  • 相关文献

参考文献4

二级参考文献15

  • 1冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:102
  • 2Mambo M, Usuda K, Okamoto E. Proxy Signature for Delegating Signing Operation[C]//Proceedings of the 3th ACM Conference on Computer and Communications Security. New York, USA: ACM Press, 1996: 48-57.
  • 3Hwang Min-Shiang, Lin Iuon-Chang, Lu Jui-Lin. A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers[J]. International Journal of Informatics, 2000, 11(2): 1-8.
  • 4Hwang Shin-Jia, Chen Chiu-Chin. Cryptanalysis of Nonrepudiable Threshold Proxy Signature Scheme with Known Signers[J]. International Journal of Informatics, 2003, 14(2): 205-212.
  • 5Shamir A. Identity-based Cryptosystems and Signature Schemes[C]// Proc. of CRYPTO'84. Berlin, Germany: Springer-Verlag, 1984.
  • 6Boneh D, Franklin M. Identity-based Encryption from the Weil Pairing[C]//Proc. of CRYPTO'01. Berlin, Germany: Springer- Verlag, 2001.
  • 7Chen Liqun, Lee M J. Improved Identity-based Signcryption[C]// Proc. of PKC'05. Berlin, Germany: Springer-Verlag, 2005: 362-379.
  • 8Waters B. Efficient Identity-based Encryption Without Random Oracles[C]//Proceedings of EUROCRYPT'05. Berlin, Germany: Springer-Verlag, 2005:114-127.
  • 9Boyen X, Waters B. Compact Group Signatures Without Random Oracles[C]//Proceedings of EUROCRYPT'06. Berlin, Germany: Springer-Verlag, 2006: 427-445.
  • 10MAMBO M,USUDA K,OKAMOTO E.Proxy signatures:delegation of the power to sign messages[J].IEICE Trans on Fundamentals,1996,E792A(9):1338-1354.

共引文献11

同被引文献26

  • 1康莉,蔡勉,王亚军.基于Nyberg-Rueppel签名体制的盲代理多重签名方案[J].通信学报,2007,28(3):115-119. 被引量:12
  • 2Chaum D.Blind Signatures System[C]//Proc.of CRYPTO'83.New York,USA:Plenum Press,1983.
  • 3Hardjono T,Zheng Y.A Practical Digital Multisignature Scheme Based on Discrete Logarithms[C]//Proc.of Advances in Cryptology-AUSCRYPT'92.Berlin,Germany:Springer-Verlag,1992.
  • 4Ham L.New Digital Signature Scheme Based on Discrete Logarithm[J].Electronics Letters,1994,30(5):396-398.
  • 5Boldyreva A.Efficient Threshold Signature,Multisignature and Blind Signature Schemes Based on the Gap-Diffie-Hellman-Group Signature Scheme[C]//Proc.of PKC'03.New York,USA:[s.n.],2003.
  • 6Lin Chih-Yin,Wu Tzong-Chen,Zhang Fangguo.A Structured Multisignature Scheme from the Gap Diffie-Hellman Group[EB/OL].(2003-09-20).http://eprint.iacr.org/2003/090.pdf.
  • 7Horster P,Michels M,Petersen H.Blind Multisignature Schemes Based on the Discrete Logarithm Problem[C]//Proc.of the 11th Annual Computer Security Applications Conference.New Orleans,USA:[s.n.],1995.
  • 8Chen Xiaofeng,Zhang Fangguo,Kim Kwangjo.ID-based Multiproxy Signature and Blind Multisignature from Billnear Pairings[C]//Proc.of KIISC'03.Korea,Seoul:[s.n.],2003.
  • 9Koblitz N.Hyperelliptic Cryptosystems[J].Journal of Cryptology,1989,1(3):139-150.
  • 10Silverman J H.The Arithmetic of Elliptic Curves[M].Beijing,China:Beijing World Publishing Corporation,1999.

引证文献3

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部