期刊文献+

一个新的无证书的门限代理签名方案 被引量:3

New certificateless threshold proxy signature scheme
下载PDF
导出
摘要 结合无证书的密码体制,提出一个新的无证书的门限代理签名方案。经分析表明,方案满足代理签名的安全要求,具有强不可伪造性、强不可否认性、强可识别性、可区分性、防止滥用等性质,且门限值由原始签名人确定,还能抵抗鲁荣波等人提出的攻击。 A new certificateless threshold proxy signature scheme is presented by using certificateless public key cryptography. By ana- lyzing the scheme in this paper, it is concluded that the scheme satisfes the security requirements of proxy signature, such as strong un- forgeability, strong nonrepudiation, strong identifiability, distinguishability, misuse prevention. The threshold value is determined by original signer. Moreover, it can resist the attack proposed by Lu Rongbo et al.
出处 《计算机工程与应用》 CSCD 2012年第9期57-59,69,共4页 Computer Engineering and Applications
基金 国家自然科学基金(No.10571113) 陕西省自然科学基金(No.2009JM8002) 陕西省教育厅科学研究计划(No.2010JK829)
关键词 无证书密码系统 无证书签名 门限代理签名 双线性对 certificateless public key cryptography certificateless signature threshold proxy signature bilinear pairing
  • 相关文献

参考文献9

  • 1Mambo M,Usuda K,Okamoto E.Proxy signature:delegation of the power to sign messages[J].IEICE Transactions on Fundamen-tals,1996,E79-A(9):1338-1354.
  • 2Zhang K.Threshold proxy signature schemes[C]//LNCS1396:In-formation Security Workshop,Japan,1997.Berlin:Springer-Verlag,1997:191-197.
  • 3Bao H Y,Cao Z F,Wang S B.Identity-based threshold proxy sig-nature scheme with known signers[C]//LNCS3959:The3rd An-nual Conference in Theory and Applications of Models of Com-putation,Beijing,China,2006.Berlin:Springer-Verlag,2006:538-546.
  • 4Huang H F,Chang C C.A novel efficient(tn)threshold proxy signature scheme[J].Information Sciences,2006,176(10):1338-1349.
  • 5Al-Riyami S,Paterson K.Certificateless public key cryptography[C]//LNCS2894:Proceedings of the Asiacrypt,Taipei,China,2003.Berlin:Springer-Verlag,2003:452-473.
  • 6Harn L,Ren J,Lin C L.Design of DL-based certificateless digi-tal signatures[J].The Journal of Systems and Software,2009,82(5):789-793.
  • 7陈虎,宋如顺.无证书代理签名和代理盲签名方案[J].计算机工程与应用,2009,45(10):92-97. 被引量:8
  • 8张磊,张福泰.一类无证书签名方案的构造方法[J].计算机学报,2009,32(5):940-945. 被引量:44
  • 9鲁荣波,何大可,王常吉.对一种基于身份的已知签名人的门限代理签名方案的分析[J].电子与信息学报,2008,30(1):100-103. 被引量:9

二级参考文献33

  • 1Mambo M,Usuda K, Okamoto E.Proxy signature:delegation of the power to sign messages[J].IEICE Trans Fundamentals,1996,E79-A (9) : 1338-1353.
  • 2Zhang K.Threshold proxy signature schemes[C]//1997 Information Security Workshop, Japan, Sep 1997 : 191-197.
  • 3Zhang F,Kim K.Id-based blind signature and proxy signature from bilinear pairings[C]//LNCS 2727:Information Security and Privacy (ACISP 2003 ).Berlin: Springer-Verlag, 2003 : 312-323.
  • 4Chaum D.Blind signatures for untraceable payments[C]//Advances in Cryptology-Crypto 82, Plenum, NY, 1983 : 199-203.
  • 5Lysyanskaya A,Ramzan Z.Group blind digital signature:A scalable solution to electronic cash[C]//Proc of the 2nd Financial Cryptography Conf, 1998:184-971.
  • 6Huang Zhen-jie,Chen Ke-fei,Wang Yu-min.Efficient identitybased signatures and blind signatures[C]//LNCS 3810:CANS 2005. Berlin Heidelberg:Springer-Verlag,2005 : 120-133.
  • 7A1-Riyami S,Paterson K.Certificateless public key cryptography[C]// LNCS:Asiacrypt 2003.[S.l.] : Springer-Verlag, 2003,2894: 452-473.
  • 8Huang Xin-yi,Mu Yi,Susilo W,et al.Certificateless signature revisited[C]//LNCS g586:Acisp 2007.[S.l.]:Springer-Verlag,2007:308-322.
  • 9Li X,Chen K,Sun L.Certificateless signature and proxy signature schemes from bilinear pairings[J].Lithuanian Mathematical Journal, 2005,45 : 76-83.
  • 10Lu R,He Da-ke,Wang Chang-ji.Cryptanalysis and improvement of a certificateless proxy signature scheme from bilinear pairings[C]//Eighth ACIS International Conference on Software Engineering,Artificial Intelligence,Networking,and Parallel/Distributed Computing, 2007.

共引文献58

同被引文献22

  • 1谭作文,刘卓军,陈伟东.存在特权集的代理门限群签名方案[J].计算机工程与应用,2004,40(25):31-34. 被引量:6
  • 2Cheng Xiangguo Xu Weidong Wang Xinmei.A THRESHOLD BLIND SIGNATURE FROM WEIL PAIRING ON ELLIPTIC CURVES[J].Journal of Electronics(China),2006,23(1):76-80. 被引量:6
  • 3AL-RIYAMI S S, PATERSON K G. Certificateless public key cryptography[ C] // Advance in Cryptography Asiacrypt 2003, LNCS 2894. Berlin: Springer-Verlag, 2003:452 -473.
  • 4CHAUM D. Blind signatures for untraceable pryment[ C]// Crypto' 82: Advances in Cryptology. Berlin: Springer, 1952:199 -203.
  • 5MAMBO M, USUDA K, OKAMOTO E. Proxy signature: Delegation of the power to sign messages[ J]. IEICE Transactions on Fundamentals, 1996, E792A (9): 1338- 1353.
  • 6LEE W B, CANG C Y. Efficient proxy signatures scheme based on discrete logarithm[ C]// Proceedings of 10 th Conference on Information Security. Washington, DC: IEEE Computer Society, 2000:4-7.
  • 7AMIT K A, SUNDER L. Proxy blind signature scheme[ EB/OL]. [ 2012 - 04 - 15]. http://eprint. iaer. org/2003/72.
  • 8HUB C, WONG D S, ZHANG ZHENFENG, et al. Certifieateless signature: A new security model and an improved generic construction [J]. Designs, Codes and Cryptography, 2007, 42(2) : 109 - 126.
  • 9ZHANG ZHENFENG, WONG D S, XU JING, et al. Certificateless public-key signature: security model and efficient construction [ C]// Proceedings of Applied Cryptography and Network Security, LNCS 3989. Berlin: Springer-Verlag, 2006:293 - 308.
  • 10DESMEDT Y, FRANKEL Y. Shared generation of authenticators and signatures[ C]// Advances in Cryptology, LNCS 576. Berlin: Springer-Verlag, 1991:457 -469.

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部