期刊文献+

一种门限代理签名方案的分析与改进 被引量:1

Analysis and Improvement of a Threshold Proxy Signature Scheme
原文传递
导出
摘要 C-Y Yang等人提出了一个安全性基于求解离散对数困难性的门限代理签名方案,该方案具有较少的通信量及较高的计算效率。基于数论知识分析该方案存在缺陷:不满足不可伪造性和不可否认性,提出了改进方案将代理密钥以门限的方式在成员间共享,使得每个成员的子代理密钥都包含个体随机数,其他成员无法获知某成员的子代理密钥。改进方案的安全性基于求解离散对数的困难性,能抵御密钥替换攻击,具备不可伪造性和不可否认性。 A threshold proxy signature scheme is proposed by S-F Tzeng、M-S Hwang and C-Y Yang,with its security based on the difficulty of solving discrete logarithm.This scheme has seldom communications volume and is of fairly high computing speed.Number theory analysis indicates that this scheme could not satisfy the undeniability and unforgeability.Thus a new scheme is proposed,in which all members hold the sub-key of the proxy key in a threshold way,and each member's sub-key involves the individual random number,all members can only know their own sub-key.the new scheme,with its security based on the discrete logarithm problem,could resist various attacks,is of undeniability or unforgeability.
作者 彭娅
出处 《通信技术》 2010年第12期118-120,共3页 Communications Technology
关键词 门限代理签名 攻击 离散对数 安全性 threshold proxy signature attack discrete logarithm security
  • 相关文献

参考文献5

二级参考文献15

  • 1QIANHaifeng CAOZhenfu XUEQingshui.A new threshold proxy signature scheme from bilinear pairings[J].Science in China(Series F),2004,47(5):612-622. 被引量:7
  • 2鲁荣波,何大可,王常吉.一种门限代理签名方案的分析与改进[J].电子学报,2007,35(1):145-149. 被引量:13
  • 3[1]Zhang K.Threshold proxy signature schemes[C].In:Okamoto E.Davida G,Mambo M,et al.Proceedings of the Information Security,Berlin:Springer-Verlag,1998:191-197.
  • 4[2]Sun H M,Lee N Y,Hwang T.Threshold proxy signatures[J].IEE Proceedings Computes and Digital Technique,1999,146(05):259-263.
  • 5[3]Sun H M.An efficient nonrepudiable threshold proxy signature scheme with known signers[J].Computer Communications,1999,22(08):717-722.
  • 6[4]Hwang M S,Lin I C,Lu E J L.A secure nonrepudiable threshold proxy signature scheme with known signers[J].International Journal of Informatica,2000,11(02):1-8.
  • 7[5]Hsu C L,Wu T S,Wu T C.New nonrepudiable threshold proxy signature scheme with known signers[J].Journal of Systems and Software,2001,58(02):119-124.
  • 8[6]Hwang M S,Lu E J L,Lin I C.A practical(t,n)threshold proxy signature scheme based on the RSA cryptosystem[J].IEEE Transactions on Knowledge and Data Engineering,2003,15(06):1552-1560.
  • 9[7]Wang G L,Feng B,Zhou J Y,et al.Comments on a practical(t,n)threshold proxy signature scheme based on the RSA cryptosystem[J].IEEE Transactions on Knowledge and Data Engineering,2004,16(10):1309-1311.
  • 10[10]Shoup V.Practical threshold signatures[C].In:Preneel B,ed.Advances in Cryptology:EUROCRYPT'2000.LNCS 1807,Berlin:Springer-Verlag,2000:208-220.

共引文献16

同被引文献10

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部