期刊文献+

典型代理签名方案的分析与改进 被引量:11

Analysis and Improvements for Proxy Signature Schemes
下载PDF
导出
摘要 简述了代理签名及其应用的研究成果和发展状况,分析了现有的、对学科发展有重要意义的几个典型代理签名方案,指出其中存在的一些缺陷,给出了Lee方案的一个改进方案。该方案克服了Lee方案的弱点,满足强不可伪造性。该文还提出了这方面研究目前所存在的问题及几个值得重视的研究方向。 In this paper,we survey the achievements in the field of proxy signatures,analyse a few typical proxy signature schemes,which have important significance for the development of this study field.And then we give an improved scheme ,which gets over the weakness of Lee's scheme ,satisfies strong unforgeability.Some problems in the study of this field are presented,and several main research directions are pointed out as well.
出处 《计算机工程与应用》 CSCD 北大核心 2004年第9期152-154,共3页 Computer Engineering and Applications
基金 山东省自然科学基金(编号:Z99G01) 山东省计委专项基金资助
关键词 代理签名 授权 强不可伪造性 proxy signature,warrant ,strong unforgeability
  • 相关文献

参考文献15

  • 1[1]B Lee,H Kim,K Kim. Strong Proxy Signature and its Applications[C].In:Proc of SCIS 2001,2001:603~608
  • 2[2]B Lee,H Kim, K Kim.Secure Mobile Agent using Strong Non-designated Proxy Signature[C].In:Proc ACIS,2001:474~486
  • 3[3]V Varadharajan,P Allen,S Black. An analysis of the proxy problem in distributed systems[C].In:Proc IEEE Computer Society Symp on Research in Security and Privacy,1991:255~275
  • 4[4]B C Neuman.Proxy-based authorization and accounting for distributed systems[C].In :Proc 13th International Conference on Distributed Computing Systems, 1993:283~291
  • 5[5]M Mambo,K Usuda,E Okamoto. Proxy Signature:Delegation of the Power to Sign Messages[J].IEICE Trans Fundamentals,1996;E79-A:1338~1353
  • 6[6]S Kim,S Park,D Won. Proxy Signature,revisited[C].In:Proc of ICICS′97 International Conference on Information and Communication Security, 1997: 223~232
  • 7[7]D Pointcheval,J Stern.Security proofs for signatures[C].In:Advances in Cryptology: Eurocrypt96, Berlin: springer, 1996: 387~398
  • 8[8]H Petersen,P Horster. Self-certified keys-Concepts and Applications[C].In:Proc Communications and Multimedia Security97,Chapman & Hall,1997:102~116
  • 9[9]H Kim,J Baek,B Lee et al. Computing with secrets for mobile agent using one-time proxy signature[C].In:SCIS′2001,2001:845~850
  • 10[10]K Shum. A Strong Proxy Signature Scheme with Proxy Signer Privacy Protection[D].MPhil Thesis. Dep of Information Engineering,Chinese University of Hong Kong,2002

同被引文献58

引证文献11

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部