期刊文献+

一个新的基于椭圆曲线上的代理签名方案

A New Proxy Signature Scheme Based on the Elliptic Curve
在线阅读 下载PDF
导出
摘要 提出一个新的基于椭圆曲线离散对数问题的代理签名方案。新方案除满足代理签名的七条基本性质外,还对目前已有的代理签名方案中尚未很好解决的问题—代理权滥用进行了有效的控制。在新方案中,若代理签名人签名超过证书上规定的次数,则他的私钥就会被破解,从而真正做到了对签名代理权的控制。 Based on elliptic curve discrete logarithm problem A proxy signature scheme is proposed.This scheme not only satisfies seven fundamental properties of proxy signature, but also effectively controls the problem of delegation power misuse, which has not been satisfactorily solved at present. In this scheme, the proxy signer can sign a signature N times at most. If the proxy signer violates the condition, his private key will be revealed. So, this scheme can control the delegation power of the proxy signer.
作者 杜红珍
出处 《咸阳师范学院学报》 2005年第4期4-6,共3页 Journal of Xianyang Normal University
基金 国家自然科学基金资助项目(编号:10271069)
关键词 椭圆曲线 椭圆曲线离散对数 代理签名 Elliptic curve Elliptic Curve Discrete Logarithm Proxy Signature
  • 相关文献

参考文献11

  • 1LEE B, KIM H, KIM K Secure Mobile agent using strong on-designated proxy signature [A]. Proc of ACISP'2001[C], 2001. 474-486.
  • 2LEE B, KIM H, KIM K. Strong proxy signature and its application[A]. Proc of ACISP'2001 [C]. 2001. 603-608.
  • 3B Lee, H Kim, K Kim. Strong Proxy Signature and its Applications [C] In: Proc of SCIS 2001, 2001:603-608
  • 4MAMBO M, USVDA K,OKAMOTOE. Proxy Signatures: Delegation of the power to sign messages [J]. IEICE Trans on Fundamentals, 1996, E79-A(9): 1338-1354.
  • 5D Pointcheral, J Stern. Security proofs for signature [C]. In:Advances in Cryptology: Eurocrypt' 96, Berlin: Springer,1996: 387-398.
  • 6王连海,徐秋亮.基于椭圆曲线密码体制的代理签名方案研究[J].计算机应用研究,2004,21(4):122-123. 被引量:9
  • 7SUN HM, CHEN BJ. Time-stamped proxy signatures with traceable receivers [A]. Proceedings of the Ninth National Conference on Information Security [C]. 1999,247-253.
  • 8甘元驹,施荣华.一种安全的有效代理签名方案[J].云南大学学报(自然科学版),2004,26(1):35-37. 被引量:3
  • 9王晓明,符方伟.基于椭圆曲线的限制代理签名方案[J].电子与信息学报,2002,24(12):1825-1828. 被引量:5
  • 10祁明,韩亮.限制性代理签名方案[J].计算机工程,2001,27(2):41-42. 被引量:12

二级参考文献15

  • 1杨先义 等.现代密码新理论[M].北京:科学出版社,2002..
  • 2Koblitz N. Elliptic Curve Cryptosystems[ J]. Mathematics of Computation, 1987,48:203-209.
  • 3Miller V S. Use of Elliptic Curve in Cryptography [ C ]. Advance in Cryptology-CRYPTO' 85 ( Santua Barbara, Calif. , 1985 ), Lecture Notes in Comput Sci, Sping-Verlag, 1986. 218,417-426.
  • 4M Mambo, K Usuda, E Okamoto. Proxy Signatures for Delegating Signing[ C]. Proc. 3rd ACM Conference on Computer and Communications Security, 1996.
  • 5K Zhang. Threshold Proxy Signature Scheme [ C]. 1997 Information Security Workshop, Janpan, 1997. 101-109.
  • 6K Zhang. Nonerepudiable Proxy Signature Scheme [ C ]. Proceeding of ACISP'97, 1997. 237-239.
  • 7N Lee, T Hwang, C Wang. On Zhang' s Nonrepudiable Proxy Signature Scheme[ C]. Proceeding of ACISP' 98,1998. 415-422.
  • 8Lee N,Proc of ACISP 98,1998年,415页
  • 9Zhang K,Proc of ACISP 97,1997年,237页
  • 10Zhang K,1997 Information Security Workshop,1977年,101页

共引文献50

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部