期刊文献+

一种辫群上代理签名方案 被引量:1

Proxy signature scheme based on braid group
下载PDF
导出
摘要 辫群是构造对抗量子攻击的公钥密码系统的新平台,代理签名是原始签名者将他的签名权委托给代理签名者的一种签名体制,代理签名者代表原始签名者进行签名。提出了一种基于辫群上求根问题的代理签名方案,随后对协议的正确性、安全性、参数选择和效率进行分析,给出了随机预言机模型下的安全性证明。新的代理签名方案可以抵抗各种已知攻击。 The braid group is a new candidate platform for constructing quantum attack-resistant public key encryption system.The proxy signature allows a proxy signer to sign messages on behalf of an original signer who delegates his signing power to the proxy signer.A proxy signature based on root finding problem over braid group was put forward,the analysis of its correctness,security,efficiency and parameter choice were subsequently presented,and afterwards the detailed formal security proofs in the Random Oracle Model(ROM) were given.The new scheme can resist current known attacks.
出处 《计算机应用》 CSCD 北大核心 2011年第11期2979-2982,共4页 journal of Computer Applications
基金 国家自然科学基金资助项目(11061014) 江西省教育厅青年科学基金资助项目(GJJ10129) 江西省教育厅科研项目(GJJ10708)
关键词 辫群 求根问题 签名 代理签名 随机预言机模型 braid group root finding problem signature proxy signature Random Oracle Model(ROM)
  • 相关文献

参考文献3

二级参考文献78

  • 1丁勇,田海博,王育民.一种改进的基于辫群的签名体制[J].西安电子科技大学学报,2006,33(1):50-52. 被引量:8
  • 2Stinson DR. Crvotoaraohv Theory and Practice. 2nd ed., New York: CRC Press, 2002. 282-285.
  • 3Tan ZW, Liu ZJ. Tang CM. Digital proxy blind signature schemes based on DLP and ECDLP. Vol.21, Beijing: Key Laboratory of Mathematics Mechanization Research, Academy of Mathematics and Systems Science, the Chinese of Academy of Sciences, 2002. 212-217.
  • 4Chaum D. Blind signature systems. In: Chaum D, ed. Proceedings of the Crypto'83. New York: Springer-Vedag, 1998. 153-156.
  • 5Chaum D, Fiat A, Naor M. Untraceable electronic cash. In: Goldwasser S, ed. Proceedings of the Crypto'88. LNCS 403, New York: Springer-Vedag, 1990. 319-327.
  • 6Chaum D, Boen B, Heyst E, Mjolsnes S, Steenbeek A. Efficient off-line electronic check. In: Quisquater J. Vandewalle J, eds. Proceedings of the Eurocrypt'89. LNCS 434, Berlin: Springer-Verlag, 1990. 294-301.
  • 7Brands S. Untraceable off-line cash in wallets with observers. In: Douglas RS, ed. Proceexlings of the Crypto'93. LNCS 773, New York: Springer-Verlag, 1994. 302-318.
  • 8Mambo M, Usuda K,Okamoto E. Proxy signatures for delegating signing operation. In: Proceedings of the 3rd ACM Conference on Computer and communications Security. New Delhi: ACM Press, 1996.48-57.
  • 9Lee B, Kim H, Kim K. Strong proxy signature and its applications. In: Proceedings of the 2001 Symposium on Cryptography and Information Security (SCIS 2001). 2001.
  • 10Zhang K. Threshold proxy signature schemes. In: Okamoto E, Davida G, Mambo M, eds. Proceedings of the Information Security Workshop 1997. LNCS 1396, Berlin: Springer-Verlag, 1998. 191-197.

共引文献95

同被引文献14

  • 1AL-RIYAMI, PATERSON. Certi fi cateless public key cryptography[C]//Advances in Cryptology-ASIACRYPT 2003. Berlin: Springer-Verlag Berlin Heideberg, 2003: 452-473.
  • 2YANG ZHENG. Digital signcryption or how to achieve cost (signature & encryption) [C] //Advances in Cryptology-CRYPTO'97. Berlin: Springer-Vedag Berlin Heideberg, 1997:165-179.
  • 3BAO F, DENG R. A signeryption scheme with signature directly verifiable by public key[C]//Advances in Cryptology-CRYPTO" 98. Berlin: Springer-Verlag Berlin Heideberg, 1998:55-59.
  • 4SHIN J B, LEE K, SHIM K. New DSA-verifiable signcryption schemes[C]//Information Security and Cryptology-ICISC 2002. Ber- lin: Springer--Verlag Berlin Heideberg, 2003:35-47.
  • 5SHARMIL S D S,VIVEK S S,RANGAN C P. Cryptanalysis of certificateless signcryption schemes and an efficient construction without pairing[C]//Information Security and Cryptology. Berlin:Springer-Verlag Berlin Heideberg, 2011:75-92.
  • 6LIU Z H, HU Y P. Certificateless signcryption scheme in the standard model[J]. Information Sciences,2010(7):452-464.
  • 7GAMAGE C, LEIWO J, ZHENG Y. An efficient scheme for secure message transmission using proxy signcryptio[C]//Proceed- ings of 22nd Australasian Computer Science Conference. Berlin:Springer-Verlag, 1999:420-431.
  • 8LI XIANGXUE, CHEN KEFEI. Identity- based proxy signcryption scheme from pairing[C]//Proceedings of the IEEE Internation- al Conference on Services Computing (SCC2004). Berlin:Springer-Verlag Berlin Heideberg,2004:494- 497.
  • 9王会歌,王彩芬,易玮,俞惠芳.高效的无证书可公开验证签密方案[J].计算机工程,2009,35(5):147-149. 被引量:8
  • 10俞惠芳,王彩芬,王之仓.基于ECC的自认证代理签密方案[J].计算机科学,2010,37(7):91-92. 被引量:5

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部