期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
共享可验证的不可否认门限多代理多重签名方案 被引量:4
1
作者 王志波 李雄 杜萍 《计算机工程与应用》 CAS CSCD 北大核心 2011年第19期93-96,127,共5页
Tzeng等人提出了一个共享可验证的不可否认门限多代理多重签名方案(TYH方案),随后Bao等人与Hsu等人分别指出该方案不能抵抗伪造攻击及不真正具有共享验证的性质,且分别提出了修改方案。基于Tzeng等人方案提出一个新的共享可验证的不可... Tzeng等人提出了一个共享可验证的不可否认门限多代理多重签名方案(TYH方案),随后Bao等人与Hsu等人分别指出该方案不能抵抗伪造攻击及不真正具有共享验证的性质,且分别提出了修改方案。基于Tzeng等人方案提出一个新的共享可验证的不可否认门限多代理多重签名方案,与这三个方案相比,该方案效率更高,而且该方案克服了TYH方案的安全性缺陷,具有更好的安全性。 展开更多
关键词 代理签名 门限代理签名 代理多签名方案 代理多签名方案 门限多代理多签名方案 共享验证
下载PDF
基于双线性对的代理签名 被引量:2
2
作者 蔡庆华 陈文莉 《计算机技术与发展》 2006年第9期230-232,共3页
双线性映射作为一种构建密码体制的新工具,在密码学领域中引起了普遍的关注,并在数字签名中得到应用。在代理签名方案中,代理签名人可以代表原始签名人生成签名;在代理多签名方案中,一个代理签名人可以同时代表多个原始签名人在文件上... 双线性映射作为一种构建密码体制的新工具,在密码学领域中引起了普遍的关注,并在数字签名中得到应用。在代理签名方案中,代理签名人可以代表原始签名人生成签名;在代理多签名方案中,一个代理签名人可以同时代表多个原始签名人在文件上签名。利用椭圆曲线上的Weil配对的双线性性质构造了一个代理数字签名方案和一个代理多签名方案,并对它们的正确性和安全性做了分析。在代理多签名方案中,代理签名的长度均独立于原始签名人的个数,其验证也与一般的代理签名类似。 展开更多
关键词 代理签名 代理多签名方案 双线性映射 WEIL配对
下载PDF
Identity-based proxy multi-signature applicable to secure E-transaction delegations
3
作者 刘建华 Wu Qianhong +1 位作者 Liu Jianwei Shang Tao 《High Technology Letters》 EI CAS 2016年第2期199-206,共8页
To enhance the robustness of a proxy multi-signature scheme and improve its efficiency, a novel proxy signature paradigm is proposed referred to as In this paradigm, multiple proxy signer candidates identity-based pro... To enhance the robustness of a proxy multi-signature scheme and improve its efficiency, a novel proxy signature paradigm is proposed referred to as In this paradigm, multiple proxy signer candidates identity-based proxy multi-signature (IBPMS). are employed to play a role of the single proxy signer in the existing model. A provably secure IBPMS scheme is presented which requires only one round broadcast operation. Performance analysis demonstrates that the new scheme outperforms the existing multi-signature schemes in robustness and communication. These properties are rendered to our IBPMS scheme as a more practical solution to secure e-transaction delegation applications of proxy signatures. 展开更多
关键词 MULTI-SIGNATURE E-transaction DELEGATION provable security information security
下载PDF
Self-certified multi-proxy signature schemes with message recovery 被引量:2
4
作者 Tzong-sun WU Chien-lung HSU Han-yu LIN 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2009年第2期290-300,共11页
Multi-proxy signature schemes allow the original signer to delegate his/her signing power to n proxy signers such that all proxy signers must corporately generate a valid proxy signature on behalf of the original sign... Multi-proxy signature schemes allow the original signer to delegate his/her signing power to n proxy signers such that all proxy signers must corporately generate a valid proxy signature on behalf of the original signer. We first propose a multi-proxy signature scheme based on discrete logarithms and then adapt it to the elliptic curve cryptosystem. With the integration of self-certified public-key systems and the message recovery signature schemes,our proposed schemes have the following advan-tages:(1) They do not require the signing message to be transmitted,since the verifier can recover it from the signature;(2) The authentication of the public keys,verification of the signature,and recovery of the message can be simultaneously carried out in a single logical step;(3) No certificate is needed for validating the public keys. Further,the elliptic curve variant with short key lengths especially suits the cryptographic applications with limited computing power and storage space,e.g.,smart cards. As compared with the previous work that was implemented with the certificate-based public-key systems,the proposed schemes give better performance in terms of communication bandwidth and computation efforts. 展开更多
关键词 Self-certified Multi-proxy signature Message recovery Smart cards Discrete logarithms Elliptic curve
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部