期刊文献+

一种具有指定验证者的高效代理签名方案 被引量:1

Efficient Proxy Signature Scheme with Designated Verifier
下载PDF
导出
摘要 指定验证者签名方案可以保护签名者的个人敏感信息不被泄露。利用该方案的优点,基于随机预言模型中的困难性假设,提出一种可证安全的具有指定验证者的代理签名方案。理论分析证明,该方案满足可验证性、强不可伪造性、强不可否认性和限制验证性,并能抵御重放攻击。 Designated verifier signature scheme can protect signer's personal sensitive information not be revealed.Taking advantages of the scheme and based on random oracle model of the difficulty assumptions,this paper proposes an efficient proxy signature scheme with designated verifier.Theoretical analysis shows that the scheme can meet the verifiability,strong unforgeability,strong undesirability,and designated verification,meanwhile,and it can resist replay attack.
出处 《计算机工程》 CAS CSCD 2012年第7期105-106,109,共3页 Computer Engineering
基金 山东科技大学研究生科技创新基金资助项目(YCA100339)
关键词 指定验证者 代理签名 离散对数问题 重放攻击 双线性对 随机预言模型 designated verifier proxy signature discrete logarithm problem replay attack bilinear pairings random oracle model
  • 相关文献

参考文献5

二级参考文献32

  • 1顾纯祥,张亚娟,祝跃飞.混合可验证加密签名体制及应用[J].电子学报,2006,34(5):878-882. 被引量:8
  • 2Al-Riyami S S, Paterson K G Certificateless Public Key Cryptography[C]//Proc. of Asia-CRYPT'03. Berlin, Germany: Springer-Verlag, 2003: 452-273.
  • 3Huang Xinyi, Susilo W, Mu Yi. On the Security of Certificatgless Signature Schemes from AsiaCRYPT 2003[C]//Proc. of CANS'05. Berlin, Germany: Springer-Verlag, 2005: 126-139.
  • 4Mambo M, Usuda K, Okamoto E. Proxy Signatures for Delegating Signing Operation[C]//Proc. of the 3rd ACM Conference-on Computer and Communications Security. New York USA: ACM Press, 1996: 48-57.
  • 5Anderson R. Invited LecttLre[C]//Proc. of the 4th ACM Conference on Computer and Communications Security. Zurich, Switzerland: [s. n.], 1997: 1-7.
  • 6Bellare M, Miner S K. A Forward Secure Digital Signature Scheme[C]//Proc. of CRYPTO'99. Berlin, Germany: Springer- Verlag, 1999:431-448.
  • 7Ohta K, Okamoto T. A Digital Multisignature Scheme Based on the Fiat Shamir Scheme[C]//Proc. of Asia-CRYPT'91. Berlin, Germany: Springer-Verlag, 1991: 139-148.
  • 8Mambo M, Usuda K, Okamoto E. Proxy Signature: Delegation of the Power to Sign Messages[J]. IEICE Trans. on Fundamentals, 1996, E79-A(9): 1338-1354.
  • 9Mambo M, Usuda K, Okamoto E. Proxy Signatures for Delegating Signing Operation[C]//Proc. of the 3rd ACM Conf. on Computer and Communications Security. New Delhi, India: ACM Press, 1996.
  • 10Zhang Kan. Threshold Proxy Signature Schemes[C]//Proceedings of ISW'97. Tatsunokuchi, Japan: [s. n.], 1997.

共引文献22

同被引文献14

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部