期刊文献+

基于RSA密码体制的门限代理签名方案 被引量:4

Threshold Proxy Signature Scheme Based on RSA Cryptosystem
下载PDF
导出
摘要 为解决现有门限代理签名方案存在的安全隐患,结合离散对数问题,提出一个基于RSA密码体制的门限代理签名方案。理论分析结果证明,该方案可以防止原始签名人的内部攻击和代理签名人的内部合谋攻击,满足不可否认性、可认证性和可识别性等安全性要求,且具有较低的运算和通信量。 By using discrete logarithm method, this paper proposes a RSA-based threshold proxy signature scheme based on the security problems of previous RSA-based threshold proxy signature scheme. Analysis results show that the new scheme can resist the original signer's insider attack and the proxy signers' conspiracy attack. Besides, the new scheme satisfies non-repudiation, verifiability, recognizability and other security requirements. And it has the advantages of simplicity of signing process, and low communications.
作者 黄梅娟
出处 《计算机工程》 CAS CSCD 2012年第8期105-106,110,共3页 Computer Engineering
基金 陕西省教育厅专项科研计划基金资助项目(2010JK398) 陕西省自然科学基础研究计划基金资助项目(2010JQ8027) 宝鸡文理学院基金资助重点项目(ZK11130)
关键词 代理签名 门限代理签名 RSA密码体制 离散对数 合谋攻击 proxy signature threshold proxy signature RSA cryptosystem discrete logarithm conspiracy attack
  • 相关文献

参考文献9

  • 1Mambo M,Usuda K,Okamoto E.Proxy Signature:Delegation ofthe Power to Sign Messages[J].IEICE Transactions onFundamentals of Electronic Communications and ComputerScience,1996,79(9):1338-1354.
  • 2Xuan Hong.Efficient Threshold Proxy Signature Protocol forMobile Agents[J].Information Sciences,2009,179(24):4243-4248.
  • 3Kang Baoyuan,Boyd C,Dawson E.A Novel NanrepudiableThreshold Multi-proxy Multi-signature Scheme[J].Computers andElectrical Engineering,2009,35(1):9-17.
  • 4Hwang Min-Shiang,Lu Jui-Lin,Lin Iuon-Chang.A Practical(t,n)Threshold Proxy Signature Scheme Based on the RSACryptosystem[J].IEEE Transactions on Knowledge and DataEngineering,2003,15(6):1552-1560.
  • 5Wang Guilin,Feng Bao,Zhou Jianying,et al.Comments on aPractical(t,n)Threshold Proxy Signature Scheme Based on theRSA Cryptosystem[J].IEEE Transactions on Knowledge and DataEngineering,2004,16(10):1309-1311.
  • 6Xue Qingshui,Cao Zhenfu,Tang Feilong.An Improved ProxySignature Scheme Based on the RSA Cryptosystem[C]//Proc.ofInternational Conference on Parallel and Distributed Processing Techniques and Application.Las Vegas,USA:[s.n.],2004.
  • 7Geng Yong-Jun,Tian Hui,Hong Fan.A Modified and PracticalThreshold Proxy Signature Scheme Based on RSA[C]//Proc.of the9th International Conference on Advanced CommunicationTechnology.Phoenix Park,Korea:[s.n.],2007:1960-1962.
  • 8程曦,戚文峰.一种基于RSA密码体制的门限代理签名方案的设计与分析[J].计算机科学,2006,33(10):108-110. 被引量:2
  • 9蒋瀚,徐秋亮,周永彬.基于RSA密码体制的门限代理签名[J].计算机学报,2007,30(2):241-247. 被引量:13

二级参考文献29

  • 1卢建朱,陈火炎,沈建军.高效的不可否认的门限代理签名新方案[J].计算机工程与应用,2005,41(31):14-16. 被引量:1
  • 2Hsu C L,Wu T S.Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attack.Applied Mathematics and Computation,2004
  • 3Wang G,Bao F,Zhou J,Deng R H.Comments on a threshold proxy signature scheme based on the RSA cryptosystem.IEEE Transaction on knowledge and data engineering,2004,16 (10):1309~1311
  • 4Hwang M S,Lu E J L,Lin I C.A practical (t,n) threshold proxy signature scheme based on the RSA cryptosystem.IEEE Transaction on Knowledge and Data Engineering,2003,15 (6):1552~1560
  • 5Shoup V.Practical threshold signature.In:Proc.Advanced in Cryptoltgy-Eurocrypt,2000.207~220
  • 6Huang Hui-Feng,Chang Chin-Chen.An efficient and practical (t,n)threshold proxy signature scheme with known signers.Fundamenta Informatica,2003,56(3):243~253
  • 7Tzeng S F,Hwang M S,Yang C Y.An improvement of nonrepudiable threshold proxy signature scheme with known signers.Computer and Security,2004,23:174~178
  • 8Tan Z W,Liu Z J.Cryptanalysis of threshold proxy signature scheme.MM Research Preprints.Dec.2004(23):226~233
  • 9Kim S,Park S,Won D.Proxy signature,revisited.In:Proc.of ICICS'97,LNCS,1334.223~232
  • 10Zhang K.Threshold proxy signature scheme.Information Security Workshop,Japan,1997.191~197

共引文献12

同被引文献39

引证文献4

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部