期刊文献+

自认证公钥代理签名方案 被引量:1

Proxy Signature Scheme Using Self-certified Public Key
在线阅读 下载PDF
导出
摘要 本文使用自认证公钥技术提出了一个新型代理签名方案。新方案具有如下优点:在验证代理签名的过程中,原始签名者和代理签名者的公钥同时被认证,使得该方案能抵抗公钥替换攻击。此外,新方案还满足强代理签名的所有性质,并且在原始签名者和代理签名者之间的通信可以不使用安全信道。 A new proxy signature scheme using self-certified public key is proposed. The proposed scheme has merits that the original signer and the proxy signer's public key can simultaneously be authenticated in verifying proxy signature process,which makes it withstand public key substitution attack. In addition,the proposed scheme satisfies all properties of strong proxy signature and doesn't need to use secure channel between the original signer and the proxy signer.
出处 《北京电子科技学院学报》 2005年第2期19-22,共4页 Journal of Beijing Electronic Science And Technology Institute
基金 国家自然科学基金资助项目(60072018) 国家"973"计划(子课题)(2002CB312002)
关键词 数字签名 代理签名 门限代理签名 不可否认性 Digital signature Proxy signature Threshold proxy signature Nonrepudiation
  • 相关文献

参考文献17

  • 1[1]Mambo M,Usuda K, Okamoto E.Proxy signatures: Delegation of the power to sign messages [J].IEICE Trans. Fundam. 1996,E79-A(9): 1338-1354.
  • 2[2]Lee B, Kim H, Kim K.Strong proxy signature and its application [A ].Proc. of ACISP2001 [ C ].2001,11B-1.603-608.
  • 3[3]Zhang K.Threshold proxy signature schemes[A].1997 Information Security Workshop[C].Japan, 1997.191-197.
  • 4[4]Sun H M,Lee N Y, Hwang T.Threshold proxy signatures[J].IEE proc.-Computers & Digital Techniques, 1999,146(5):259-263.
  • 5[5]Kim S,Park S,Won D.Proxy signatures,revisited[A].Proc. ICICS'97,Int. Conf. on Information and Communications Security [C]. LNCS 1334,Springer-Verlag, 1997.223-232.
  • 6伊丽江,白国强,肖国镇.代理多重签名:一类新的代理签名方案[J].电子学报,2001,29(4):569-570. 被引量:70
  • 7[8]Girault M.Self-certified public keys [A].In: Advances in Cryptology-Eurocrypt'91 [C].Berlin:Springer, 1991.491-497.
  • 8李继国,曹珍富,张亦辰.Improvement of M-U-O and K-P-W proxy signature schemes[J].Journal of Harbin Institute of Technology(New Series),2002,9(2):145-148. 被引量:10
  • 9李继国,曹珍富.一个门限代理签名方案的改进[J].计算机研究与发展,2002,39(11):1513-1518. 被引量:26
  • 10李继国,曹珍富,张亦辰.Nonrepudiable Proxy Multi—Signature Scheme[J].Journal of Computer Science & Technology,2003,18(3):399-402. 被引量:12

二级参考文献50

  • 1李继国,曹珍富,张亦辰.Improvement of M-U-O and K-P-W proxy signature schemes[J].Journal of Harbin Institute of Technology(New Series),2002,9(2):145-148. 被引量:10
  • 2[1]M.Mambo,K.Usuda,and E.Okamot.Proxy signatures:Delegation of the power to sign messages [J].IEICE Trans.Fundamentals,1996,E79-A(9):1338-1354.
  • 3[2]S.Kim,S.Park and D.Won proxy signatures,revisited [A].Proc.of ICICS'97,International Conference on Information and Communications Security [C],LNCE,1334,1997:223-232.
  • 4[3]K.Ohta and t.Okamoto.A digital multisignature scheme based on the Fiat-Shamir scheme [A].Advances in Cryptology—ASIACRYTP'91 [C]:.139-148.
  • 5Yi L J, Bai G Q, Xiao G Z. Proxy multi-signature scheme: A new type of proxy signature scheme. Electron. Lett., 2000, 36: 527-528.
  • 6Hwang S J, Shi C H. Specifiable proxy signature schemes. In 1999 Computer Symposium, Taipei, 1999,pp.190-197.
  • 7E1Gamal T. A public key cryptosystem and signature scheme based on discrete logarithms. IEEE Trans.,1985, IT-31(4): 469--472.
  • 8Sun H M, Chen B J. Time-stamped proxy signatures with traceable receivers. In Proc. the Ninth National Conference on Information Security, 1999, pp.247-253.
  • 9Sun H M. Design of time-stamped proxy signatures with traceable receivers. In IEE Proc. Computers & Digital Techniques, 2000, 147(6): 462-466.
  • 10Mambo M, Usuda K, Okamoto E. Proxy signatures for delegating signing operation. In Proc. 3rd ACM Conference on Computer and Communications Security,ACM Press, 1996, pp.48--57.

共引文献105

同被引文献2

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部