%0 Journal Article %T A Secure Threshold Proxy Signature Scheme
一个安全的门限代理签名方案 %A Wang Xiao-ming %A Zhang Zhen %A Fu Fang-wei %A
王晓明 %A 张震 %A 符方伟 %J 电子与信息学报 %D 2006 %I %X A secure threshold proxy signature scheme is proposed aiming at conspiracy attack, that is, any t (t is threshold value) or more malicious proxy signatures may work together to reconstruct the secret polynomial of the proxy group and derive the secret keys of other members in the proxy group, consequently they can impersonate some other proxy signers to generate a valid threshold proxy signature. The new scheme can not only satisfy the properties of the threshold proxy signature, but also withstand the conspiracy attack. Furthermore, the proxy signer’s proxy signing capability can be revoked if the original signer needs. %K Cryptography %K Digital signature %K Threshold proxy signature %K Conspiracy attack
密码学 %K 数字签名 %K 门限代理签名 %K 合谋攻击 %U http://www.alljournals.cn/get_abstract_url.aspx?pcid=5B3AB970F71A803DEACDC0559115BFCF0A068CD97DD29835&cid=1319827C0C74AAE8D654BEA21B7F54D3&jid=EFC0377B03BD8D0EF4BBB548AC5F739A&aid=ECF7678660358964&yid=37904DC365DD7266&vid=D3E34374A0D77D7F&iid=DF92D298D3FF1E6E&sid=9A66D940867B74F7&eid=C02C1722E0B3854F&journal_id=1009-5896&journal_name=电子与信息学报&referenced_num=0&reference_num=8