期刊文献+

一种改进的代理签名方案

AN IMPROVEMENT IN PROXY SIGNATURE SCHEME
下载PDF
导出
摘要 描述了代理签名方案的一般性定义,以及常用的代理签名方案。就文献[1]第四部分提出的第一个问题:把标准签名RSA移植到代理签名的授权过程,对常用的代理签名方案进行改进。这个改进的方案不需要相互传送代理密钥,在授权的过程中只进行身份认证,既增加了安全性,同时效率也得到了提高。 This paper describes the general definition of proxy signature scheme,and the frequently-used proxy signature scheme.With regard to the first problem pointed out in part four of the literature: the authorisation process of transplanting standard RSA signature to proxy signature,an improvement on the frequently-used proxy signature scheme is made.This improved scheme needn't mutually transfer agent keys,in the process of authorisation only the identity need to be authorised,thus the security is increased and the efficiency is also improved as well.
出处 《计算机应用与软件》 CSCD 2011年第9期286-288,共3页 Computer Applications and Software
关键词 数字签名 代理签名 RSA Schnorr数字签名 Data signature Proxy signature RSA Schnorr data signature
  • 相关文献

参考文献2

二级参考文献16

  • 1[1]B Lee,H Kim,K Kim. Strong Proxy Signature and its Applications[C].In:Proc of SCIS 2001,2001:603~608
  • 2[2]B Lee,H Kim, K Kim.Secure Mobile Agent using Strong Non-designated Proxy Signature[C].In:Proc ACIS,2001:474~486
  • 3[3]V Varadharajan,P Allen,S Black. An analysis of the proxy problem in distributed systems[C].In:Proc IEEE Computer Society Symp on Research in Security and Privacy,1991:255~275
  • 4[4]B C Neuman.Proxy-based authorization and accounting for distributed systems[C].In :Proc 13th International Conference on Distributed Computing Systems, 1993:283~291
  • 5[5]M Mambo,K Usuda,E Okamoto. Proxy Signature:Delegation of the Power to Sign Messages[J].IEICE Trans Fundamentals,1996;E79-A:1338~1353
  • 6[6]S Kim,S Park,D Won. Proxy Signature,revisited[C].In:Proc of ICICS′97 International Conference on Information and Communication Security, 1997: 223~232
  • 7[7]D Pointcheval,J Stern.Security proofs for signatures[C].In:Advances in Cryptology: Eurocrypt96, Berlin: springer, 1996: 387~398
  • 8[8]H Petersen,P Horster. Self-certified keys-Concepts and Applications[C].In:Proc Communications and Multimedia Security97,Chapman & Hall,1997:102~116
  • 9[9]H Kim,J Baek,B Lee et al. Computing with secrets for mobile agent using one-time proxy signature[C].In:SCIS′2001,2001:845~850
  • 10[10]K Shum. A Strong Proxy Signature Scheme with Proxy Signer Privacy Protection[D].MPhil Thesis. Dep of Information Engineering,Chinese University of Hong Kong,2002

共引文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部