期刊文献+

基于ECDSA的代理多签名方案 被引量:1

Digital proxy multi-signature scheme based on ECDSA
下载PDF
导出
摘要 首先对ECC和ECDSA在安全性和运算速度方面的优越性进行了分析,椭圆曲线数字签名算法非常适用于代理多签名方案。将现有的方案改进后,提出一个改进的基于ECDSA的代理多签名方案,并对新方案做了安全性分析。验证结果表明:改进的方案具有强不可伪造性、强可区分性、抗抵赖性和可控性,并且无需在安全信道下传送,抗攻击性更强。通过更短小的程序代码和封装模块的复用,保证方案适用于微小软/硬件和不安全的外部环境。 The study aimed to analyzethesuperiority of security and speed on ECC and ECDSA,and then ex- plore if thecurve digital signature algorithm could be suitable for proxy multi-signature scheme. After the modification of the existing schemes, an improved proxy multi-signature scheme was proposedbased on ECDSAtoanalyze the security of new scheme. The improved schemes showedstrong unforgeability, high dis- tinguishability,non-repudiation and controllability,as well as avoiding thetransferring in the security chan- nel. By reusing the shorter code and the packaging module, it was found that the solution was more suitable for micro software/hardware and unsafe external environment.
作者 郭星 陈春芳
出处 《南昌大学学报(理科版)》 CAS 北大核心 2015年第3期243-246,共4页 Journal of Nanchang University(Natural Science)
基金 江西省自然科学基金资助项目(20114BAB201007 20142BAB201007) 江西省教育厅科学研究基金资助项目(GJJ13081) "江西省‘十二五’重点学科‘管理科学与工程’"资助
关键词 公钥密码学 椭圆曲线 代理签名 代理多签名 public key cryptography elliptic curve proxy signature Proxy multi-signature
  • 相关文献

参考文献8

  • 1MAMBI M, USUDA K,OKAMOTO E. Proxy signa tures:Delegation of the power to sign messages [J].IEICE Transactions on Fundamentals of Electronic Communications and Computer Science, 1996, E79-A (9) : 1338-1354.
  • 2MAMBI M, USUDA K,OKAMOTO E. Proxy signa- turesfor delegation signing operation[C].//Proc of the 3rd ACM Conference on Computer and Communication Security. [S. 1. ]:ACM Press, 1996.
  • 3伊丽江,白国强,肖国镇.代理多重签名:一类新的代理签名方案[J].电子学报,2001,29(4):569-570. 被引量:70
  • 4纪家慧,李大兴.新的代理多签名体制[J].计算机研究与发展,2004,41(4):715-719. 被引量:24
  • 5曹天杰,林东岱,薛锐.基于椭圆曲线的代理多签名方案的安全性分析[J].小型微型计算机系统,2006,27(5):798-801. 被引量:7
  • 6李力,周升力,郑超美.RSA密码的一种快速实现算法[J].南昌大学学报(理科版),2008,32(5):498-500. 被引量:2
  • 7CHEN Tzer-Shyong, HUNG Yu-fang, HWANGGwo- Shiuan. Efficient proxy multisignature schemes based on theelliptic curve cryptosystem[J]. Computers & Security, 2003,22 (6) : 527-534.
  • 8CHEN Tzer-Shyong, LIUTzuoh-Pyng, HWANGGwo- Shiuan, et al. An improvement of proxy-protected proxy multi-signature scheme[C]//Proceedings of the Inter-national Conference on Information Manage ment, 2002 : 33-40.

二级参考文献23

  • 1陈昭智,郑建德.Montgomery算法在大数模幂运算中的改进[J].厦门大学学报(自然科学版),2004,43(B08):275-278. 被引量:4
  • 2陈运.一种组合RSA算法[J].电子科技大学学报,1996,25(2):116-119. 被引量:9
  • 3周德新.实现RSA的高效算法[J].桂林电子工业学院学报,1996,16(2):1-5. 被引量:4
  • 4Rivest R L, Shamir A, Adleman L. A Method for Obtaining Digital Signatures and Public Key Cryptosystems [ M ]. Comm, ACM, 1977.
  • 5Phillips B J, Burgess N. Implementing 1024 - bits RSA Exponentiation on a 32 -bits Processor Core~ M]. IEEE International Conference on Application Specific Systems, Architecture and Processor( A SAP' 00),2000.
  • 6Lou D, Chang C. An Adaptive Exponentiation Method [J]. The Journal of Systems and Software, 1998,42( 1 ) : 59 - 69.
  • 7王育民,刘建伟.通信网的安全[M].西安:西安电子科技大学出版社,1999.
  • 8冯登国,裴定一.密码学引导[M].北京:科学出版社,1999.
  • 9[1]M.Mambo,K.Usuda,and E.Okamot.Proxy signatures:Delegation of the power to sign messages [J].IEICE Trans.Fundamentals,1996,E79-A(9):1338-1354.
  • 10[2]S.Kim,S.Park and D.Won proxy signatures,revisited [A].Proc.of ICICS'97,International Conference on Information and Communications Security [C],LNCE,1334,1997:223-232.

共引文献88

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部