期刊文献+

一种基于身份的代理聚合签名方案 被引量:7

An Identity-based Proxy Aggregate Signature Scheme
下载PDF
导出
摘要 结合代理签名和聚合签名的优点,提出一种基于身份的代理聚合签名方案,该方案可减少签名验证的工作量,解决公钥证书的管理问题。理论分析表明,该方案安全有效,适合应用在智能卡和移动通信领域。 Combining proxy signature and aggregate signature,an identity-based proxy aggregate signature scheme was proposed.It reduces the workload in verifying signatures and resolves the public keys management problem.Theory analysis proves that it is secure and efficient,specially applying in smart card and mobile communication.
出处 《济南大学学报(自然科学版)》 CAS 北大核心 2011年第3期301-304,共4页 Journal of University of Jinan(Science and Technology)
基金 陕西省自然科学基金(2009JM8002) 陕西省教育厅科学研究计划自然科学基金(07JK375) 河北师大附属民族学院科研基金(200906Y03-2)
关键词 密码学 代理签名 聚合签名 基于身份的签名 cryptography proxy signature aggregate signature ID-based signature
  • 相关文献

参考文献10

  • 1MAMBO M, USUDA K, OKAMATO E. Proxy signatures for delega- ting signing operation[ C]///Proceedings of the 3 rd ACM Confer- ence on Computer and Communications Security. New York : ACM, 1996:48 - 57.
  • 2HWANG S J, CHEN C C. New multi-proxy-multi-signature schemes [ J ]. Applied Mathematics and Computation,2004,147:57 - 67.
  • 3SUN H. Design of time-stamped proxy signature with traceable re- ceivers [J]. IEE Proc Comput Digit,2000,147 (6) :462 - 466.
  • 4HUANG H, CHANG C. A novel efficient (t, n) threshold proxy signature scheme[J]. Information Science,2006,176 (10) : 1338 - 1349.
  • 5HWANG M, LU J, LIN I. A practical ( t, n) threshold proxy signa- ture scheme based on RSA cryptosystem [ J ]. IEEE Trans on Knowledge and Data Engineering, 2003,15 ( 6 ) : 1552 - 1560.
  • 6BAO Haiyong, CAO Zhenfu, WANG Shengbao. Identity based thresh- old proxy signature scheme with knows signers[C] //The 3rd Annual Conference in Theory and Applications of Models of Computation- TAM' 06. Berlin : Springer-Verlag,2006:538 - 546.
  • 7ZHANG Fangguo. Efficient ID-based blind signature and proxy sig- nature from bilinear parings [ C ] // Proc of ACISP' 03. Berlin : Springer-Verlag,2003 : 312 - 323.
  • 8LI Mingxiang,HAN Botao,ZHU Jianyong,et al. Identity-based proxy signature scheme secure in standard model [ J ]. Journal of South China University of Technology (Natural Science Edition ), 2009 (5) :118 - 122,129.
  • 9BONEH D, GENTRY C. Aggregate and verifiably encrypted signa- tures from bilinear maps [ C ]//Advances in Cryptography-Euro- crypt 2003. Berlin : Springer-Verlag,2003:416 - 432.
  • 10CHA J C, CHEON J H. An identity-based signature from gap Dif- fie-Hellman groups [ C ] //Public Key Cryptography-PKC 2003. Berlin : Springer-Verlag, 2003 : 18 - 30.

同被引文献62

  • 1罗文俊,李祥.矩阵特征值的两方安全保密计算[J].吉首大学学报(自然科学版),2003,24(4):31-34. 被引量:1
  • 2Shun-DongLi Yi-QiDai.Secure Two-Party Computational Geometry[J].Journal of Computer Science & Technology,2005,20(2):258-263. 被引量:36
  • 3罗文俊,李祥.多方安全矩阵乘积协议及应用[J].计算机学报,2005,28(7):1230-1235. 被引量:34
  • 4Yao A. Protocol for secure c0mpulation[ C].//Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computers Science, Los An- geles, 1982 : 159 - 164.
  • 5Naor M, Pinkas B. Distributed Oblivious Transfer[ A ]. Advances in Cryptology: Asiacry' O0 Proceedings: LNCS1976, Springer - Verlag, 2000 : 2O0 -219.
  • 6Cachin C, Micali S, Stadler M. Computationally private information retrieval with polyogarithmic communication [ M ]. Advances in cryptology, 1998:308 - 319.
  • 7Luo Wen- jun, Li Xiang. A study of secure multi -party statistical analysis [C].//Proceedings of IEEE International Conference on Computer Networks and Mobile Computing, Shanghai, 2003:376 - 383.
  • 8Du Wenliang, Atallah M.J. Privacy - preserving cooperative scientific computation[ C ].//Proceedings of the 14th IEEE Computer Security Foun- dations Workshop, Nova Scotia, Canada, 2001:273 - 283.
  • 9Du Wenliang. A study of several specific secure two-party computation problems[ D]. USA: Purdue University,2001:270 -280.
  • 10MAMBO M,USUDA K,OKAMOTO E.Proxy signature:delegation of the power to sign messages [ J ].IEICE Trans Fundamentals,1996,E79-A(9):1338-1353.

引证文献7

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部