期刊文献+

强前向安全的代理签名方案 被引量:3

Strong forward-secure proxy signature scheme
下载PDF
导出
摘要 前向安全代理签名方案无法保证代理者密钥泄漏后未来时段代理签名的安全性。基于单向散列链,对王天银等提出的前向安全代理签名方案进行了改进,使该方案的代理签名具有强前向安全性:即使代理密钥被泄露,攻击者也无法伪造过去和未来时段的代理签名,并且具有密钥泄露检测功能。 Forward-secure proxy signature schemes can not protect the security of the signatures generated after the proxy key exposure.Based on the forward-secure proxy signature scheme proposed by Wang Tianyin,et al,a strong forward-secure proxy signature scheme with key exposure detection is proposed by introducing the mechanism of one-way hash chain.Even if the malicious attacker can intrude the system at certain period,he can not forge any signatures in the past and future periods.
出处 《计算机工程与应用》 CSCD 北大核心 2010年第30期101-103,共3页 Computer Engineering and Applications
基金 国家自然科学基金No.60663006 新疆维吾尔自治区高校科研计划资助No.XJEDU2008S14~~
关键词 前向安全 强前向安全 代理签名 单向散列链 forward security; strong forward security; proxy signature; one-way hash chain;
  • 相关文献

参考文献14

  • 1Mambo M,Usuda K, Okamoto E.Proxy signatures for delegating signing operation[C]//Proc 3rd ACM Conference on Computer and Communications Security.[S.l.]:ACM Press,1996:48-57.
  • 2Mambo M, Usuda K, Okamoto E.Proxy signatures: Delegation of the power to sign messages[J].IEICE Trans Fundam, 1996, E79-A (9) : 1338-1354.
  • 3Zhang K.Threshold proxy signature schemes[C]//LNCS 1396: Proceedings of ISW 1997.[S.l.]:Springer-Verlag,1997:272-290.
  • 4Yi L,Bai G,Xiao G.Proxy multi-signature scheme:A new type of proxy signature scheme[J].Electronics Letters, 2000, 36(6): 527-528.
  • 5Lee B,Kim H,Kim K.Strong proxy signature and its applications[C]//LNCS 2119:SCIS2001,2001:603-608.
  • 6Wang G.Designated-verifier proxy signature schemes[C]//Proc the 8th IFIP Conference on Communication and Multimedia Security, CMS' 04, Kluwer, 2004.
  • 7Anderson R.Invited lecture[C]//Fourth Annual Conference on Computer and Communications Security,ACM, 1997.
  • 8BeUare M,Miner S K.A forward-secure digital signature scheme [C]//Advances in Cryptology-CRYPTO'99,1999:431-448.
  • 9王晓明,陈火炎,符方伟.前向安全的代理签名方案[J].通信学报,2005,26(11):38-42. 被引量:35
  • 10王天银,张建中.一个新的前向安全的代理数字签名方案[J].计算机工程与应用,2005,41(25):133-135. 被引量:19

二级参考文献50

  • 1王永静,谢冬青,陈华勇.证书撤销机制的分析与设计[J].计算机应用研究,2004,21(9):147-149. 被引量:8
  • 2程华琴,马传贵,高峰修.对一种密钥绝缘签名方案的改进[J].信息工程大学学报,2006,7(1):1-3. 被引量:4
  • 3李景峰,潘恒,祝跃飞.基于单向散列链的公钥证书撤销机制[J].小型微型计算机系统,2006,27(4):642-645. 被引量:9
  • 4张波,徐秋亮.一个强前向安全的代理签名方案[J].计算机工程与应用,2006,42(9):109-110. 被引量:9
  • 5Anderson R.Invited lecture[C]//Fourth Annual Conference on Computer and Communications Security, |997.
  • 6Bellare M,Miner S K.A forward-secure digital signature scheme[C]// Advances in Cryptology-CRYPTO' 99, 1999: 431-448.
  • 7Abdalla M,Reyzin LNew forward-secure digital signature scheme[C]// Advances in Cryptology-ASIACRYPT'00,2000:116-129.
  • 8Krawczyk H.Simple forward-secure signatures from any signature scheme[Cl//7th ACM Conference on Computer and Communication Security, 2000 : 108-115.
  • 9Itkis G,Reyzin L.Forward-secure signatures with optimal signing and verifying[Q//Advances in Cryptology-CRYPTO'01,2001:332-354
  • 10Kozlov A,Reyzin L.Forward-secure signatures with fast key update[C]// 3rd Conference on Security in Communication Networks,2002.

共引文献60

同被引文献33

  • 1李景峰,潘恒,祝跃飞.基于单向散列链的公钥证书撤销机制[J].小型微型计算机系统,2006,27(4):642-645. 被引量:9
  • 2张波,徐秋亮.一个强前向安全的代理签名方案[J].计算机工程与应用,2006,42(9):109-110. 被引量:9
  • 3洪方,万麟瑞.基于SSL协议的表单数字签名模型研究[J].计算机应用与软件,2006,23(5):124-127. 被引量:2
  • 4李虓,何明星.基于RSA的前向安全的数字签名[J].计算机工程与应用,2006,42(16):124-126. 被引量:7
  • 5Anderson, R . "Two Remarks on public key eryptology". Invited Lecture in Fourth Annual Conference on Computer and Communications Security,ACM, 1997.
  • 6Chaum D.Blind signatures for untraceable payments[C]//Proceedings of Advances in Cryptology-Crypto'82.New York: Plenum Press, 1983 : 199-203.
  • 7Mambo M, Usuda K, Okamoto E.Proxy signatures for dele-gating signing operation[C]//Advances in the 3rd ACM Conference on Computer and Communications Security.New York: ACM Press, 1996 : 48-57.
  • 8Mambo M, Usuda K, Okamoto E.Proxy signatures: delega- tion of the power to sign messages[J].IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 1996,79(9) : 1338-1354.
  • 9Anderson R.Two remarks on public key cryptology[C]//The Fourth ACM Computer and Communication Security.New York: ACM Press, 1997 : 151-160.
  • 10Lin W D, Jan J K.A security personal learning tools using a proxy blind signature scheme[C]//Proceedings of Interna- tional Conference on Chinese Language Computing.USA: Chinese Language Computer Society Knowledge Systems Institute, 2000: 273-277.

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部