期刊文献+
共找到157篇文章
< 1 2 8 >
每页显示 20 50 100
Improvement of Identity-Based Threshold Proxy Signature Scheme with Known Signers
1
作者 LI Fagen HU Yupu CHEN Jie 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1653-1656,共4页
In 2006, Bao et al proposed an identlty-based threshold proxy signature scheme with known signers. In this paper, we show that Bao et al's scheme is vulnerable to the forgery attack. An adversary can forge a valid th... In 2006, Bao et al proposed an identlty-based threshold proxy signature scheme with known signers. In this paper, we show that Bao et al's scheme is vulnerable to the forgery attack. An adversary can forge a valid threshold proxy signature for any message with knowing a previously valid threshold proxy signature. In addition, their scheme also suffers from the weakness that the proxy signers might change the threshold value. That is, the proxy signers can arbitrarily modify the threshold strategy without being detected by the original signer or verifiers, which might violate the original signer's intent. Furthermore, we propose an improved scheme that remedies the weaknesses of Bao et al's scheme. The improved scheme satisfies all secure requirements for threshold proxy signature. 展开更多
关键词 identity-based cryptography threshold proxy signature bilinear pairings
下载PDF
Security Analysis and Improvement of Some Threshold Proxy Signature Schemes 被引量:2
2
作者 XUE Qingshui CAO Zhenfu 《通讯和计算机(中英文版)》 2005年第1期17-25,共9页
关键词 密码系统 数字信号 服务器 内部处理器并行运算
下载PDF
Secure Chained Threshold Proxy Signature without and with Supervision
3
作者 Zoe L. JIANG S. M. YIU +2 位作者 Y. DONG L. C. K. HUI S. H. Y. WONG 《Journal of Software Engineering and Applications》 2009年第4期267-275,共9页
Threshold Proxy Signature (TPS) scheme facilitates a manager to delegate his signing capability to a group of n2 sub-ordinates without revealing his own private key, such that a subgroup of at least t2 ≤ n2 subordina... Threshold Proxy Signature (TPS) scheme facilitates a manager to delegate his signing capability to a group of n2 sub-ordinates without revealing his own private key, such that a subgroup of at least t2 ≤ n2 subordinates is required to generate a proxy signature. In reality, the situation can be more complicated. First of all, the subgroup may further delegate their proxy signing capabilities to another group of n3 subordinates such that at least another subgroup of at least t3 ≤ n3 subordinates are of the proxy signing capabilities (in the form of a chain). t2 can be unequal to t3 depending on the concrete requirement. This is a group-to-group delegation problem. In addition, a supervising agent (SA) may be introduced in the above chain to supervise the subordinates, such that proxy signing can only be successfully executed with SA’s agreement. This is a delegation with supervision problem in the threshold delegation chain described above. These two extensions of delegation problems are not solved yet. This paper designs two provably secure cryptographic schemes Chained Threshold Proxy Signature (CTPS) scheme and Chained Threshold Proxy Signature with Supervision (CTPSwS) scheme to solve these two delegation problems. 展开更多
关键词 DELEGATION threshold proxy signature Chained threshold proxy signature with SUPERVISION
下载PDF
A Blind Threshold Proxy Signature Scheme with Revoking Anonymity
4
作者 Xiaoming Wang 《通讯和计算机(中英文版)》 2005年第9期41-45,共5页
下载PDF
IMPROVEMENT OF NONREPUDIABLE THRESHOLD MULTI-PROXY THRESHOLD MULTI-SIGNATURE SCHEME WITH SHARED VERIFICATION 被引量:2
5
作者 Xie Qi Wang Jilin Yu Xiuyuan 《Journal of Electronics(China)》 2007年第6期806-811,共6页
In 2005, Bao, et al. [Appl. Math. and Comput., vol.169, No.2, 2005] showed that Tzeng, et al.’s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification was insecure, and proposed an improv... In 2005, Bao, et al. [Appl. Math. and Comput., vol.169, No.2, 2005] showed that Tzeng, et al.’s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification was insecure, and proposed an improved scheme with no Share Distribution Center (SDC). This paper shows that Bao, et al.’s scheme suffers from the proxy relationship inversion attack and forgery attack, and pro- poses an improvement of Bao, et al.’s scheme. 展开更多
关键词 Digital signature proxy signature threshold proxy signature threshold multi-proxy threshold multi-signature threshold verification
下载PDF
SECURITY ANALYSIS AND IMPROVEMENT OF A NEW THRESHOLD MULTI-PROXY MULTI-SIGNATURE SCHEME 被引量:2
6
作者 Lu Rongbo He Dake Wang Chanji 《Journal of Electronics(China)》 2008年第3期372-377,共6页
Kang, et al. [Journal of Electronics(China), 23(2006)4] proposed a threshold multi-proxy multi-signature scheme, and claimed the scheme satisfies the security requirements of threshold multi-proxy multi-signature. How... Kang, et al. [Journal of Electronics(China), 23(2006)4] proposed a threshold multi-proxy multi-signature scheme, and claimed the scheme satisfies the security requirements of threshold multi-proxy multi-signature. However, in this paper, two forgery attacks are proposed to show that their schemes have serious security flaws. To overcome theses flaws, an improvement on Kang, et al.’s scheme is proposed. 展开更多
关键词 proxy signature threshold proxy signature Multi-proxy multi-signature Forgery attack
下载PDF
Multi-proxy quantum group signature scheme with threshold shared verification 被引量:4
7
作者 杨宇光 《Chinese Physics B》 SCIE EI CAS CSCD 2008年第2期415-418,共4页
A multi-proxy quantum group signature scheme with threshold shared verification is proposed. An original signer may authorize a proxy group as his proxy agent. Then only the cooperation of all the signers in the proxy... A multi-proxy quantum group signature scheme with threshold shared verification is proposed. An original signer may authorize a proxy group as his proxy agent. Then only the cooperation of all the signers in the proxy group can generate the proxy signature on behalf of the original signer. In the scheme, any t or more of n receivers can verify the message and any t - 1 or fewer receivers cannot verify the validity of the proxy signature. 展开更多
关键词 quantum signature multi-proxy quantum group signature threshold shared verification
下载PDF
A new threshold proxy signature scheme from bilinear pairings 被引量:7
8
作者 QIANHaifeng CAOZhenfu XUEQingshui 《Science in China(Series F)》 2004年第5期612-622,共11页
Based on the GDH signature (short signature scheme) a probabilistic signature scheme is proposed in this paper with security proof.Then a new threshold proxy signature from bilinear pairings is proposed as well by us ... Based on the GDH signature (short signature scheme) a probabilistic signature scheme is proposed in this paper with security proof.Then a new threshold proxy signature from bilinear pairings is proposed as well by us ing the new probabilistic signature scheme and the properties of the Gap Diffie-Hellman (GDH)group (where the Computational Diffie-Hellman problem is hard but the Decisional Diffie-Hellman problem is easy to solve).Our constructions are based on the recently proposed GDH signature scheme of Bonel et al.s article.Bilinear pairings could be built from Weil pairing or Tate pairing.So most our constructions would be simpler,but still with high security.The proposed threshold proxy signature is the first one which is built from bilinear pairings.At the end of this paper security and performance of the threshold proxy signature scheme is also analyzed. 展开更多
关键词 probabilistic signature scheme threshold proxy signature VSS bilinear pairings.
原文传递
Identity-based threshold signature and mediated proxy signature schemes 被引量:3
9
作者 YU Yong YANG Bo SUN Ying 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2007年第2期69-74,共6页
Proxy signature schemes allow an original signer to delegate his signing rights to a proxy signer. However, many proxy signature schemes have the defect which is the inability to solve the proxy revocation problem. In... Proxy signature schemes allow an original signer to delegate his signing rights to a proxy signer. However, many proxy signature schemes have the defect which is the inability to solve the proxy revocation problem. In this article, we firstly propose an identity-based threshold signature scheme and show that it has the properties of unforgeability and robustness. In our threshold signature scheme, we adopt such a method that the private key associated with an identity rather than the master key is shared. Then, based on the threshold signature scheme, an identity-based mediated proxy signature scheme is proposed where a security mediator (SEM) is introduced to help a proxy signer to generate valid proxy signatures, examine whether a proxy signer signs according to the warrant, and check the revocation of a proxy signer. It is shown that the proposed scheme satisfies all the security requirements of a secure proxy signature. Moreover, a proxy signer must cooperate with the SEM to generate a valid proxy signature, which makes the new scheme have an effective and fast proxy revocation. 展开更多
关键词 IDENTITY-BASED threshold signature mediated proxy signature bilinear pairings
原文传递
A secure threshold Paillier proxy signature scheme 被引量:2
10
作者 Pei-yih TING Chia-huei HSEU 《Journal of Zhejiang University-Science C(Computers and Electronics)》 SCIE EI 2010年第3期206-213,共8页
As e-commerce applications and the underlying public key infrastructure have become more popular over time,many digital mechanisms emulating traditional business activities have been developed and deployed. To build a... As e-commerce applications and the underlying public key infrastructure have become more popular over time,many digital mechanisms emulating traditional business activities have been developed and deployed. To build a full-fledgedsecure digital world,secure implementations of more commercial activity primitives are required. In this paper,we present asecure proxy signature scheme and its threshold version based on the homomorphic Paillier cryptosystem,which can be used inmany e-commerce applications such as e-voting,e-bidding/auction,and privacy-preserving data mining. These two schemes areexistentially unforgeable against chosen-message attacks and chosen-warrant attacks in the random oracle model. Although it isbased on factoring,the threshold Paillier proxy scheme operates without requiring any trusted dealer or combiner. Thus,these twoschemes are practical for integration in modularized secure multi-party protocols. 展开更多
关键词 Paillier proxy signature threshold scheme Secure multi-party protocols Cryptographic primitives
原文传递
Improvement on threshold proxy signcryption scheme
11
作者 TAN Zuo-wen 《通讯和计算机(中英文版)》 2007年第5期40-46,共7页
关键词 阈代理签名 信息传输 保密通信 密码学 公匙
下载PDF
The security analysis of a threshold proxy quantum signature scheme 被引量:5
12
作者 SHI JianHong ZHANG ShengLi CHANG ZhengGang 《Science China Chemistry》 SCIE EI CAS 2013年第3期519-523,共5页
In the YW threshold proxy quantum signature scheme proposed by Yang and Wen,it is found that the basic signature key is the same as the basic verification key,which means that the bitwise exclusive OR(XOR) of the t pr... In the YW threshold proxy quantum signature scheme proposed by Yang and Wen,it is found that the basic signature key is the same as the basic verification key,which means that the bitwise exclusive OR(XOR) of the t proxy signature keys is exactly the XOR of the t proxy verification keys.Therefore,the proxy signers can deny their signature and the specific verifiers can forge a legal signature.Furthermore,an attacker can obtain a legal threshold proxy signature for an arbitrary new message.These findings show that there are hidden security loopholes that should be carefully constructed in designing more efficent YW-scheme. 展开更多
关键词 quantum cryptography quantum signature threshold proxy signature secret sharing
原文传递
A Universal Composability Framework for Analysis of Proxy Threshold Signature
13
作者 洪璇 李详学 +1 位作者 龚征 陈克非 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第1期107-111,共5页
The universal composability framework is a new approach for designing and analyzing the security of cryptographic protocols.In this framework,the security of protocols is maintained under a general protocol compositio... The universal composability framework is a new approach for designing and analyzing the security of cryptographic protocols.In this framework,the security of protocols is maintained under a general protocol composition operation.In the paper,we propose the universal composability framework for the analysis of proxy threshold signature and present a universally composable secure proxy threshold signature scheme which is the first one in this area.The proposed scheme is suitable for the mobile agents,which should migrate across different environment through network.Furthermore,we give the concrete analysis of the reduction to prove the security of the proposed scheme. 展开更多
关键词 proxy threshold signature universal composability RSA cryptosystem mobile agents
原文传递
Threshold proxy quantum signature scheme with threshold shared verification 被引量:6
14
作者 YANG YuGuang1,3,4 & WEN QiaoYan2 1 College of Computer Science and Technology,Beijing University of Technology,Beijing 100124,China 2 State Key Laboratory of Networking and Switching Technology,Beijing University of Posts and Tele-communications,Beijing 100876,China +1 位作者 3 State Key Laboratory of Integrated Services Network,Xidian University,Xi’an 710071,China 4 State Key Laboratory of Information Security(Graduate University of Chinese Academy of Sciences) ,Beijing 100049,China 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2008年第8期1079-1088,共10页
A threshold proxy quantum signature scheme with threshold shared verification is proposed. An original signer could authorize a group as its proxy signers. Then only t or more of n persons in the proxy group can gener... A threshold proxy quantum signature scheme with threshold shared verification is proposed. An original signer could authorize a group as its proxy signers. Then only t or more of n persons in the proxy group can generate the proxy signature on behalf of the original signer and any t-1 or fewer ones cannot do that. When the proxy signature needs to be verified,any t or more of n persons belonging to the verification group can verify the message and any t-1 or fewer ones cannot verify the validity of the proxy signature. 展开更多
关键词 QUANTUM signature threshold proxy QUANTUM group signature threshold SHARED verification
原文传递
代理签名的现状与进展 被引量:56
15
作者 李继国 曹珍富 +1 位作者 李建中 张亦辰 《通信学报》 EI CSCD 北大核心 2003年第10期114-124,共11页
首先描述了代理签名产生的背景、现状与进展。然后,介绍了代理签名的概念、要求、分类与述评,给出了几种典型的代理签名方案,并进行相应的分析与述评。最后,指出了目前代理签名方案存在的问题, 并且对未来的研究方向进行了展望。
关键词 数字签名 代理签名 门限代理签名 不可否认性 可区分性
下载PDF
基于RSA密码体制的门限代理签名 被引量:13
16
作者 蒋瀚 徐秋亮 周永彬 《计算机学报》 EI CSCD 北大核心 2007年第2期241-247,共7页
在一个(t,n)门限代理签名体制中,原始签名者可以将他的签名权利以门限的方式委托给n个代理签名者,至少t个代理签名者合作,可以产生相应的代理签名,而任何少于t个代理签名者则不能.目前已经有很多基于离散对数问题的门限代理签名方案,但... 在一个(t,n)门限代理签名体制中,原始签名者可以将他的签名权利以门限的方式委托给n个代理签名者,至少t个代理签名者合作,可以产生相应的代理签名,而任何少于t个代理签名者则不能.目前已经有很多基于离散对数问题的门限代理签名方案,但是并没有出现一个真正意义上的基于RSA密码体制的门限代理签名方案.鉴于RSA在理论及应用中的重要性,基于RSA构造门限代理签名体制是必要的.文中借助于RSA秘密共享的思想,构造了一个安全、有效的RSA门限代理签名方案.在文中的方案中,没有使用可信权威,所有的秘密参数都是由参与者分布式产生的. 展开更多
关键词 RSA 代理签名 门限 门限代理签名
下载PDF
具有已知代理人的不可否认门限代理签密方案(英文) 被引量:9
17
作者 李继国 李建中 +1 位作者 曹珍富 张亦辰 《软件学报》 EI CSCD 北大核心 2003年第12期2021-2027,共7页
1996年,Mambo等人提出了代理签名概念.但是,代理签名仅能提供授权的认证而不能提供保密性.Chan和Wei提出一个门限代理签密方案(记为Chan-Wei方案),扩展了代理签名的概念.指出他们的方案不满足强不可伪造性、强不可否认性和强识别性.基于... 1996年,Mambo等人提出了代理签名概念.但是,代理签名仅能提供授权的认证而不能提供保密性.Chan和Wei提出一个门限代理签密方案(记为Chan-Wei方案),扩展了代理签名的概念.指出他们的方案不满足强不可伪造性、强不可否认性和强识别性.基于Chan-Wei方案,提出一个能够克服Chan-Wei方案缺点的不可否认门限代理签密方案.给出方案的完备性证明和安全性分析.此外,与Chan-Wei方案相比,所提出的方案能够确切地发现哪些代理人提供假子密钥或篡改子密钥. 展开更多
关键词 代理签密 代理签名 门限密码学 离散对数 不可否认性
下载PDF
一个门限代理签名方案的改进 被引量:26
18
作者 李继国 曹珍富 《计算机研究与发展》 EI CSCD 北大核心 2002年第11期1513-1518,共6页
1996年 Mambo,Usuda和 Okamoto提出了代理签名的概念 ,即在一个代理签名方案中 ,一个被指定的代理签名人可以代表原始签名人生成有效的代理签名 .Mambo,U suda和 Okam oto指出代理签名方案应满足不可否认性、可验证性、不可伪造性、可... 1996年 Mambo,Usuda和 Okamoto提出了代理签名的概念 ,即在一个代理签名方案中 ,一个被指定的代理签名人可以代表原始签名人生成有效的代理签名 .Mambo,U suda和 Okam oto指出代理签名方案应满足不可否认性、可验证性、不可伪造性、可区分性等性质并给出 3种类型的代理签名 :完全代理签名 ,部分代理签名和带有授权证书的代理签名 .Sun,L ee和 Hwang提出了一个门限代理签名方案 (记为 S- L- H方案 ) ,分别克服了由Zhang和 Kim等提出的门限代理签名方案的缺点并给出了一个改进方案 .这里指出 S- L- H方案不能抵抗公钥替换攻击 ,并给出了一个改进的门限代理签名方案 .进一步利用零知识的思想给出了抵抗公钥替换攻击的一般方法 .改进后的方案除具有 S- L- H方案的安全性外 ,还具有不可否认性、不使用安全信道、能抵抗公钥替换攻击和合谋攻击等特点 . 展开更多
关键词 门限代理签名 数字签名 代理签名 不可否认性 密码 信息安全
下载PDF
基于RSA的门限多重代理多重签名方案 被引量:11
19
作者 祁传达 李溪 金晨辉 《计算机工程与设计》 CSCD 北大核心 2007年第21期5105-5107,共3页
利用陈克菲提出的基于仿射空间的门限RSA密码体制,设计了一个新的多重代理、多重签名方案。该方案中有一个原始签名组G_o={O_1,O_2,…,O_(N1)}和一个代理签名组G_P={P_1,P_2,…,P_(N2))。原始签名组中任何T_1(T_1≤N_1)个成员都可代表... 利用陈克菲提出的基于仿射空间的门限RSA密码体制,设计了一个新的多重代理、多重签名方案。该方案中有一个原始签名组G_o={O_1,O_2,…,O_(N1)}和一个代理签名组G_P={P_1,P_2,…,P_(N2))。原始签名组中任何T_1(T_1≤N_1)个成员都可代表原始签名组将签名权委托给代理签名组,而原始签名组中任何少于T_1个成员都不可能进行有效的授权;代理签名组中任何T_2(T_2≤N_2)个成员都可代表代理签名组依据授权进行代理签名,而代理签名组中任何少于T_2个成员都不可能进行有效签名。该方案签名方案能够满足不可否认性、不可伪造性和可识别性的要求。 展开更多
关键词 数字签名 代理签名 门限代理签名 秘密共享 RSA密码体制
下载PDF
对一种基于身份的已知签名人的门限代理签名方案的分析 被引量:9
20
作者 鲁荣波 何大可 王常吉 《电子与信息学报》 EI CSCD 北大核心 2008年第1期100-103,共4页
在TAMC’06上,Bao等人以双线性对为工具,首次提出了一种基于身份的已知签名人的门限代理签名方案(以下标记为BCW方案),并得出了满足强不可伪造性以及原始签名人发送签名了的授权证书时并不需要安全信道等安全性结论。本文对BCW方案进行... 在TAMC’06上,Bao等人以双线性对为工具,首次提出了一种基于身份的已知签名人的门限代理签名方案(以下标记为BCW方案),并得出了满足强不可伪造性以及原始签名人发送签名了的授权证书时并不需要安全信道等安全性结论。本文对BCW方案进行了安全性分析,成功地给出了一种攻击,攻击者通过公开渠道获得一个合法的原始签名人发送给代理签名人的签名了的授权证书以及代理签名人已经生成的一个有效的代理签名后,能够伪造出一个新的对相同消息的代理签名,而原始签名人变为攻击者自己。由于验证者并不能验证代理签名人到底是代表谁生成了代理签名,这样,攻击者就获得了与合法原始签名人相同的权益。为了避免这种攻击,本文提出了改进的措施,分析表明,改进措施能有效地弥补了该方案的安全缺陷。 展开更多
关键词 门限代理签名 代理签名 基于身份的公钥体系 不可伪造性 分布式计算
下载PDF
上一页 1 2 8 下一页 到第
使用帮助 返回顶部