期刊文献+

具有已知代理人的不可否认门限代理签密方案(英文) 被引量:9

A Nonrepudiable Threshold Proxy Signcryption Scheme with Known Proxy Agent
下载PDF
导出
摘要 1996年,Mambo等人提出了代理签名概念.但是,代理签名仅能提供授权的认证而不能提供保密性.Chan和Wei提出一个门限代理签密方案(记为Chan-Wei方案),扩展了代理签名的概念.指出他们的方案不满足强不可伪造性、强不可否认性和强识别性.基于Chan-Wei方案,提出一个能够克服Chan-Wei方案缺点的不可否认门限代理签密方案.给出方案的完备性证明和安全性分析.此外,与Chan-Wei方案相比,所提出的方案能够确切地发现哪些代理人提供假子密钥或篡改子密钥. In 1996, Mambo et al. introduced the concept of proxy signature. However, a proxy signature only provides the delegated authenticity and doesnt provide the confidentiality. Chan and Wei proposed a threshold proxy signcryption scheme (denoted as Chan-Wei scheme), which extended the concept of proxy signature. In this paper, the authors demonstrate Chan-Wei scheme does not satisfy strong unforgeablity, strong nonrepudiation and strong identifiability. Based on Chan-Wei scheme, a nonrepudiable threshold proxy signcryption scheme with known proxy agents is proposed. The proposed scheme overcomes the weaknesses of Chan-Wei scheme. Completeness proof and security analysis of the proposed scheme are presented. In addition, compared with Chan-Wei scheme, the proposed scheme exactly finds out which proxy agents present bogus secret shadow or tamper secret shadow.
出处 《软件学报》 EI CSCD 北大核心 2003年第12期2021-2027,共7页 Journal of Software
基金 国家自然科学基金 国家杰出青年科学基金 国家教育部博士点基金 国家高技术研究发展计划(863) 国家重点基础研究发展规划(973)~~
关键词 代理签密 代理签名 门限密码学 离散对数 不可否认性 proxy signcryption proxy signature threshold cryptography discrete logarithm nonrepudiation
  • 相关文献

参考文献2

二级参考文献21

  • 1Nechvatal, James. Public key cryptography. In: G J Simmons ed. Contemporary Cryptology: The Science of Information Integrity. Piscatoway, N J: IEEE Press, 1991. 177~288
  • 2M Mambo, K Usuda, E Okamoto. Proxy signatures for delegating signing operation. In: Proc of the 3rd ACM Conf on Computer and Communications Security. New Delhi, India:ACM Press, 1996. 48~57
  • 3M Mambo, K Usuda, E Okamoto. Proxy signatures:Delegation of the power to sign messages. IEICE Trans on Fundam, 1996, E79-A (9): 1338~1354
  • 4K Zhang. Threshold proxy signature schemes. 1997 Information Security Workshop, Japan, 1997
  • 5H M Sun, N Y Lee, T Hwang. Threshold proxy signatures.IEE Proc-Computers & Digital Techniques, 1999, 146 (5): 259~263
  • 6S Kim, S Park, D Won. Proxy signatures, revisited. In: Proc of the Int'l Conf on Information and Communications Security (ICICS'97), LNCS 1334. Berlin: Springer-Verlag, 1997. 223~232
  • 7H M Sun. An efficient nonrepudiable threshold proxy signature scheme with known signers. Computer Communications,1999, 22(8): 717~722
  • 8M S Hwang, I C Lin, E J L Lu. A secure nonrepudiable threshold proxy signature scheme with known signers.International Journal of Informatica, 2000, 11(2): 1~8
  • 9H M Sun, B J Chen. Time-stamped proxy signatures with traceable receivers. The 9th National Conf on Information Security, Taipei, Taiwan, 1999
  • 10H M Sun. Design of time stamped proxy signatures with traceable receivers. IEE Proc-Computers & Digital Techniques, 2000, 147(6): 462~466

共引文献38

同被引文献77

  • 1李继国,曹珍富,张亦辰.Improvement of M-U-O and K-P-W proxy signature schemes[J].Journal of Harbin Institute of Technology(New Series),2002,9(2):145-148. 被引量:10
  • 2陈伟东,冯登国.签密方案在分布式协议中的应用[J].计算机学报,2005,28(9):1421-1430. 被引量:19
  • 3黄欣沂,张福泰,伍玮.一种基于身份的环签密方案[J].电子学报,2006,34(2):263-266. 被引量:17
  • 4张鹏,叶澄清,马雪英,李欣.一种改进的门限代理签密协议[J].浙江大学学报(工学版),2006,40(3):392-394. 被引量:3
  • 5[1]Mambo M,Usuda K, Okamoto E.Proxy signatures: Delegation of the power to sign messages [J].IEICE Trans. Fundam. 1996,E79-A(9): 1338-1354.
  • 6[2]Lee B, Kim H, Kim K.Strong proxy signature and its application [A ].Proc. of ACISP2001 [ C ].2001,11B-1.603-608.
  • 7[3]Zhang K.Threshold proxy signature schemes[A].1997 Information Security Workshop[C].Japan, 1997.191-197.
  • 8[4]Sun H M,Lee N Y, Hwang T.Threshold proxy signatures[J].IEE proc.-Computers & Digital Techniques, 1999,146(5):259-263.
  • 9[5]Kim S,Park S,Won D.Proxy signatures,revisited[A].Proc. ICICS'97,Int. Conf. on Information and Communications Security [C]. LNCS 1334,Springer-Verlag, 1997.223-232.
  • 10[8]Girault M.Self-certified public keys [A].In: Advances in Cryptology-Eurocrypt'91 [C].Berlin:Springer, 1991.491-497.

引证文献9

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部