期刊文献+

基于椭圆曲线密码体制的安全代理多重盲签名方案 被引量:1

A Security Proxy Multi-Blind Signature Based on ECC
下载PDF
导出
摘要 结合安全代理多重签名和肓签名,提出了一种基于椭圆曲线安全代理多重盲签名方案。该方案的安全是依赖于椭圆曲线密码体制。经分析该方案可以有效抵御伪造代理签名攻击,保护代理签名人的合法利益,具有更强抗攻击性和实用性。 Combine the security proxy multi-signature and blind signature, a security proxy multi-blind signature scheme was proposed based on elliptic curve cryptosystem. The scheme's security is dependent on the elliptic curve cryptosystem.This scheme can effectively resist the forged proxy signature attack, protect the legitimate interests of the proxy signer, have a stronger anti-attack and practical.
作者 周立章 ZHOU LI-zhang (School of Mathematics and Computer Engineering, XiHua University, Chengdu 610039, China)
出处 《电脑知识与技术》 2011年第7期4684-4686,共3页 Computer Knowledge and Technology
关键词 代理签名 密码体制 代理多重盲签名 proxy signature Cryptography proxy multi-blind signature
  • 相关文献

参考文献7

二级参考文献36

  • 1吴旭辉,沈庆浩.一种代理多签名体制的安全性分析[J].通信学报,2005,26(7):119-122. 被引量:6
  • 2曹天杰,林东岱,薛锐.基于椭圆曲线的代理多签名方案的安全性分析[J].小型微型计算机系统,2006,27(5):798-801. 被引量:7
  • 3左为平,李海峰.一种安全的椭圆曲线代理签名方案[J].佳木斯大学学报(自然科学版),2007,25(4):495-497. 被引量:5
  • 4MAMBO M, USUDA K, OKAMOTO E. Proxy signature: delegation of the power to sign messages[ J]. IEICE Trans on Fundamentals of Electronics Communications and Computer Sciences, 1996, E79A(9) : 1338-1354.
  • 5SHAO Zu-hua. Proxy signature schemes based on factoring[ J]. Information Processing Letters, 2003,85 (3) : 137-143.
  • 6LEE B, KIM H, KIM K. Strong proxy signature and its applications [ C]//Proc of Symposium on Cryptography and Information Security. Oiso, Japan :[ s. n. ], 2001:603-608.
  • 7KOBLITZ N. Elliptic curve cryptosystems [ J ]. Mathematics of Computation, 1987,48 ( 1 ) : 203- 209.
  • 8MILLER V S. Use of elliptic curve in cryptography[ C]//Proc of Advances in Cryptology-Crypto' 85. New York : Springer-Verlag, 1986 : 417-426.
  • 9CAELLI W J, DAWSON E P, REA S A. PKI, elliptic curve cryptography, and digital signatures [ J ]. Computers and Security, 1999, 18(1) : 47-66.
  • 10CHEN T S, LIU T P, HWANG G S, et al. An improvement of proxyprotected proxy multi-signature scheme [ C ]//Proc of the 13th International Conference on Information Management. 2002:33-40.

共引文献92

同被引文献12

  • 1康莉,蔡勉,王亚军.基于Nyberg-Rueppel签名体制的盲代理多重签名方案[J].通信学报,2007,28(3):115-119. 被引量:12
  • 2D. Chaurru Blind Signature for Untraceable Payments[C]. Advances in Cryptology Crypto, 1982 199-203.
  • 3Fan Chun-I, Lei Chin-Laung. Low-computation partially blind signatures or electronic cash[J]. IEICE Transactions on Fun- damentals of Electronics, Communications and Computer Sci- ences, May 1998 E81 A (n5):818-824.
  • 4GalIegos-Garcia Gina, G6mez-Cdrdenas Roberto, DuchfiN- Sdnchez Gonzalo I. Identity based threshold cryptography and blind signatures for electronic voting[J]. WSEAS Transactions on Computers, January, 2010, 9(nl) : 62-71.
  • 5Mambo M. , Usuda K. Okamoto E. Proxy Signature for Delegating Signing Operation[C]. In Proceedings of the 3. th ACM Conference on Computer and Communications Security, New York: ACM Press, 48-57.
  • 6Yi Lijiang, Bai Guoqiang, Xiao Guozhen. Proxy multi-signa- ture seheme:a new type of proxy signature scheme[J]. Elec- tronics Letters,2000,36(6) 527-528.
  • 7Chien, Hung-Yu. Extending RSA cryptosystems to proxy multi-signature scheme allowing parallel individual signing op- eration[J]. Journal of the Chinese Institute of Engineers, Transactions of the Chinese Institute of Engineers, Series A/ Chung-kuo Kung Ch' eng Hsuch K/ an, May, 2006, 29 (n3) : 527-532.
  • 8Feng Cao, Zhenfu Cao. A secure identity-based multi-proxy signature scheme [J]. Computes Electrical Engineering, 2009,35(1) :86-95.
  • 9Rongxing Lu, Zhenfu Cao, Yuan Zhou. Proxy blind multi-sig nature scheme without a secure channel[J]. Applied Mathe- matics and Computation, May 2005,164(1):179-187.
  • 10CAMENISH J. Group signature schemes and payment sys terns based on the discrete logarithm problem [D]. PhD Dis sertation, Switzerland: ETH Zurich, 1998: 11-12.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部