期刊文献+

一种优化的代理多重数字签名方案 被引量:1

An Improved Proxy Multi-signature Scheme
下载PDF
导出
摘要 在代理多重签名方案中,指定的代理签名者可以代表一组原始签名者生成签名.现有的基于离散对数的代理多重签名方案大多不能有效抵抗合谋攻击和伪造攻击.为了解决这些安全问题,提出了一种新的基于离散对数的代理多重签名优化方案.在优化方案中,用户的私钥和公钥通过托管中心与原始签名人之间的相互监督和验证生成,从而保证密钥的安全.此外,该方案还可以抵抗合谋攻击和伪造攻击. In a proxy multi-signature scheme, the specified proxy signer can generate a signature on behalf of a group of original signers. Most of existing proxy multi-signature schemes based on discrete logarithm cannot effectively resist the collusion attack and forgery attack. In order to solve these security problems, a new proxy multi-signature scheme was proposed based on discrete logarithm. In the optimized scheme, both the user’s private key and public key are generated by the mutual supervision and verification between the escrow center and the original signer to ensure the security of the keys. In addition, the program also can resist conspiracy attacks and forgery attacks.
作者 郑建国 张彩娟 ZHENG Jian-guo;ZHANG Cai-juan(School of Communication Engineering, Zhejiang Post and Telecommunication College, Shaoxing Zhejiang 312016, China;School of Communication Engineering, Hangzhou Dianzi University, Hangzhou 310018, China)
出处 《海南热带海洋学院学报》 2018年第2期59-63,共5页 Journal of Hainan Tropical Ocean University
基金 浙江省2017年度访问工程师校企合作项目(FG2017217) 2016年度绍兴市高等教育教学改革重点课题项目(JG0117010)
关键词 数字签名 多重数字签名 代理多重签名 digital signature muhi-signature proxy muhi-signature
  • 相关文献

参考文献9

二级参考文献56

  • 1张强,朱丽娜,赵佳.可信计算中远程证明方法的研究[J].微计算机信息,2008,24(12):54-56. 被引量:3
  • 2LIJi-guo ZHANGYi-chen ZHUYue-long.A New Proxy Signature Scheme with Message Recovery Using Self-Certified Public Key[J].Wuhan University Journal of Natural Sciences,2005,10(1):219-222. 被引量:3
  • 3马春波,敖珺,何大可.基于双线性映射的多重签名与群签名[J].计算机学报,2005,28(9):1558-1563. 被引量:14
  • 4祁明,肖国镇.加强广义El Gamal型签名方案的安全性[J].电子学报,1996,24(11):68-72. 被引量:10
  • 5Mambo M, Usuda K, Okamoto E. Proxy signature: delegation of the power to sign messages. EICE Trans. Fundamentals, 1996,E79-A:9: 1338- 1353.
  • 6Lee B, Kim H, Kim K. Strong proxy signature and its applications. International Conference on Information and Communication Security, Proc. of SCIS, Japan, 2001:603 - 608.
  • 7Lee B, Kim H, Kim K. Secure mobile agent using strong non-designated proxy signature Proc. ACISP, Spring-Verlag,2001, LNCS 1334:474 - 486.
  • 8Shum K, Wei Victor K. A strong proxy signature scheme with proxy signer privacy protection. http:∥www. computer. org/proceedings/wetice/1748/17480055.pdf, 2002.
  • 9Kim S, Park S, Won D. Proxy signature, revisited, International Conference on Information and Communication Security, Proc of ICICS' 97, Berlin, Springer, 1997:223 - 232.
  • 10ZHANG K.Threshold proxy signature scheme [A].Information Security Workshop[C],Japan,1977.101-109.

共引文献103

同被引文献11

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部