期刊文献+

一个采用惟密文验证签字的Mobile Agent新方案 被引量:3

A NOVEL SCHEME OF THE MOBILE AGENT WITH THE CIPHER TEXT ONLY SIGNATURE VERIFICATION
下载PDF
导出
摘要 在未来分布式计算机环境中移动代理系统起着极为重要的作用 ,这种采用异步式通信的软件代理应具有许多优点并可使整个网络的效率提高 ,因而存在广泛的应用 .但是 ,软件编制的移动代理容易受其运行主机上恶意软件的攻击 ,保护移动代理不受窜扰成为移动代理能正常运行的关键 .而一般的加密及签字技术不能直接适用于移动代理环境 ,因此 ,需要开发新的签字加密技术 .结合洋葱路由技术 ,提出了一个采用惟密文数字签名验证的移动代理系统新方案 ,以增强移动代理的安全可靠性 . Mobile agent systems, which have several advantages and raise the whole networks efficiency by using asynchronous communication mode as software agents, play important roles in distributed computer systems in the future and find wide applications. However, the mobile software agents are vulnerable to attack from malicious programs running on the hosts, and it is the key to the mobile agents' security running to protect them against being tampered by malicious hosts. It is necessary to develop new secure protocols that can be used in mobile agents because the old ones are unsuitable to these environments. Combined with an onion routing scheme, a mobile agent system, by using the cipher text only signature verification, is presented to enhance its security and reliability. Finally, analysis of its security is conducted.
出处 《计算机研究与发展》 EI CSCD 北大核心 2001年第7期811-815,共5页 Journal of Computer Research and Development
基金 国家自然科学基金项目资助 (6 0 0 730 5 2 )
关键词 网络安全 移动代理 洋葱路由 数字签名 公钥密码 惟密文验证 计算机网络 networks security, mobile agent, onion routing, digital signature, signcryption
  • 相关文献

参考文献6

  • 1伊丽江,白国强,肖国镇.代理多重签名[J].计算机研究与发展,2001,38(2):204-206. 被引量:31
  • 2Gamage C,2nd Int'l Workshop Practice Theory Public Key Cryptography,1999年,69页
  • 3王育民,通信网的安全.理论与技术,1999年
  • 4Wang X F,Australian Workshop on Distributed Artificial Intelligence:Multi-agent System:Theories,Languages and,1998年,183页
  • 5Bao F,Proc of the 1st Int Workshop on Practice and Theory in Public Key Cryptography,1998年,55页
  • 6Zheng Y L,Proc Information Security Workshop:Information Security,1997年,201页

二级参考文献3

  • 1[1]Mambo M, Usuda K, Okamoto E. Proxy signatures: Delegation of the power to sign messages. IEICE Trans on Fundamentals, 1996, E79-A(9): 1338~1354
  • 2[2]Kim S, Park S, Won D. Proxy signatures, Revisited. In: Proc of Int'l Conf on Information and Communications Security, LNCS 1334. Springer-Verlag, 1997. 223~232
  • 3[3]Ohta K, Okamoto T. A digital multisignature scheme based on the Fiat-Shamir Scheme. In: Advances in Cryptology-ASIACRYPT'91, Springer-Verlag, 139~148

共引文献30

同被引文献27

  • 1Zheng Y. Digital signcryption or how to achieve cost (Signature & Encryption ) cost ( Signature ) + cost (Encryption) [G]//LNCS 1294 : Advances in Cryptology- Crypto'97. Berlin: Springer, 1997:165-179
  • 2Zheng Y. Identification, signature and signcryption using high order residues modulo an RSA composite [C] HLNCS 1992: Proc of PKC'01. Berlin: Springer, 2001:48-63
  • 3Zheng Y. Signcryption and its applications in efficient public key solutions [C] //LNCS 1397: Proc of ISW'97. Berlin: Springer, 1998:291-312
  • 4Yum B H, Lee P J. New signcryption schemes based on KCDSA [C] //LNCS 2288: Proc of ICISC'01. Berlin: Springer, 2001:305-317
  • 5Cramer R, Shoup V. Design and analysis of practical publickey eneryption schemes secure against adaptive chosen eiphertext attack [J]. SIAM Journal on Computing, 2003, 33(1): 167-226
  • 6Dent A W. Hybrid signcryption schemes with outsider security [C] //LNCS 3650: Proc of ISC 2005. Berlin: Springer, 2005:203-217
  • 7Shamir A. Identity-based cryptosystems and signature schemes [C] //LNCS 196: Advances in Cryptology- Proceedings of CRYPTO'84. Berlin: Springer, 1985:48-53
  • 8Boneh D, Franklin M. Identity based eneryption from the weil pairing [C]//LNCS 2139: Advances in Cryptology Crypto 2001. Berlin: Springer, 2001:213-229
  • 9Lee J M. Identity based signcryption [OL]. [2002-07-19]. http://eprint. iacr. org/2002/098
  • 10Libert 15, Quisquater J J. New identity based signcryption schemes from pairings [OL]. [2002-02-04]. http://eprint. iacr. org/2003/023

引证文献3

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部