全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

已知签名人的门限代理签名方案

DOI: 10.13190/jbupt.200604.103.lily, PP. 103-106

Keywords: 代理签名,合谋攻击,不可否认性

Full-Text   Cite this paper   Add to My Lib

Abstract:

在将典型代理签名方案的授权方式加以改进的基础上,通过引入代理群管理员来分发秘密份额,提出了一个已知签名人的门限代理签名方案,该方案避免了签名的滥用,具有能够辨识真正签名人的不可否认性质。此外,该方案能够抵抗合谋攻击。

References

[1]  Mambo M, Usuda K, Okamoto E. Proxy signature: delegation of the power to sign messages[J]. IEICE Trans Fundamentals, 1996, E79-A (9): 1338-1353.
[2]  Mambo M, Usuda K, Okamoto E. Proxy signatures for delegating signing operation // Proc 3rd ACM Conference on Computer and Communications Security. New York: ACM Press, 1996: 48-57.
[3]  Kim S, Park S, Won D. Proxy signature, revisited// International Conference on Information and Communication Security. : Springer-Verlag, 1997: 223-232.
[4]  Lee B, Kim H, Kim K. Strong proxy signature and its application // Proc of ACISP 2001. Japan:, 2001: 603-608.
[5]  Lee B, Kim H, Kim K. Secure mobile agent using strong non-designated proxy signature // Proc of ACISP 2001. London: Springer-Verlag, 2001: 474-486.
[6]  丘慧敏, 杨义先, 胡正名, 等.一种基于ElGamal数字签名的双向用户鉴别方案[J]. 北京邮电大学学报, 2005, 28(3): 100-103. Qiu Huimin, Yang Yixian, Hu Zhengming, et al. A two-way user authentication scheme based on ElGamal digital signature[J]. Journal of Beijing University of Posts and Telecommunications, 2005, 28(3): 100-103.
[7]  Kim H, Baek J, Lee B, et al. Computing with secrets for mobile agent using one-time proxy signature // ACISP 2001. Japan:, 2001: 845-850.
[8]  Tzeng S F, Hwang M S, Yang C Y. An improvement of nonrepudiable threshold proxy signature scheme with known signers[J]. Computer Security, 2004(23): 174-178.
[9]  Petersen H, Horster P. Self-certified keys-concepts and applications // Proc of 3rd Conference on Communications and Multimedia Security. : Chapman & Hall, 1997: 102-116.
[10]  谷利泽, 李忠献, 杨义先. 不需要可信任方的匿名代理签名方案[J]. 北京邮电大学学报, 2005, 28(1): 48-51. Gu Lize, Li Zhongxian, Yang Yixian. A anonymous proxy signature scheme without a trusted party[J]. Journal of Beijing University of Posts and Telecommunications, 2005, 28(1): 48-51.
[11]  Shum K, Wei V K. A strong proxy signature with proxy signer privacy protection //Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises. Pittsburgh: , 2002: 55-57.
[12]  Zhang K. Threshold proxy signature schemes // Information Security Workshop. Japan:, 1997: 191-197.
[13]  Sun Hungmin, Lee N Y, Hwang T. Threshold proxy signatures [J]. IEEE Proceedings Computers & Digital Techniques, 1999, 146(5): 259-263.
[14]  Sun Hungmin. An efficient nonrepudiable threshold proxy signature scheme with known signers[J]. Computer Communications, 1999, 22(8): 717-722.
[15]  Hsu C L, Wu T S, Wu T C. New nonrepudiable threshold proxy signature scheme with known signers[J]. The Journal of System and Software, 2001, 58(2): 119-124.
[16]  Hwang S J, Shi C H. A simple multi-proxy signature scheme // Proceedings of the Tenth National Conference on Information Security. Taiwan:, 2000: 134-138.
[17]  Hwang S J, Chen Chiuchin. A new proxy multi-signature scheme // International Workshop on Cryptology and Network Security. Taiwan: , 2001: 26-28.
[18]  Yi Lijiang, Bai Guoqiang, Xiao Guozhen. Proxy multi-signature: a new type of proxy signature schemes[J]. Acta Electronica Sinica, 2001, 29(4): 569-570.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133