期刊文献+

一个新的前向安全的代理数字签名方案 被引量:19

A New Forward-Secure Proxy Digital Signature Scheme
在线阅读 下载PDF
导出
摘要 对文献[9]提出的一个前向安全的强代理数字签名方案进行了安全性分析,发现该方案存在安全隐患,不具有前向安全性。基于Guillou-Quisquater签名体制,提出了一个新的前向安全的代理数字签名方案,并分析了所提方案的安全性。 Through the security analysis of a forward-secure strong proxy digital signature scheme proposed recently by Tan and Liu,we have found the scheme having security omission and no forward security,This article proposes a new forward-secure proxy digital signature scheme based on Guillou-Quisquater signature scheme,and analyzes its security,
出处 《计算机工程与应用》 CSCD 北大核心 2005年第25期133-135,182,共4页 Computer Engineering and Applications
基金 国家自然科学基金(编号:10271069) 陕西省自然科学基金(编号:2002A03) 陕西师范大学重点项目资助
关键词 前向安全 数字签名 代理签名 伪造攻击 forward security, digital signature, proxy signature, forgery attack
  • 相关文献

参考文献14

  • 1MAMBO M,USUDA K,OKAMOTO E.Proxy signatures for delegating signing operation[C].In:Proc 3rd ACM Conference on Computer and Communications Security, ACM Press, 1996: 48-57.
  • 2MAMBO M,USUDA K,OKAMOTO E.Proxy signatures:delegation of the power to sign messages[J].IEICE Trans Fundam, 1996;E79-A(9): 1338-1354.
  • 3ZHANG K.Threshold proxy signature schemes[C].In: 1997 Information Security Workshop,Japan, 1997 : 191-197.
  • 4SUN H M.Design of time-stamped proxy signatures with traceable receivers[J].IEE Proc Computers & Digital Techniques,2000; 147(6): 462 -466.
  • 5YI L J,BAI G Q,XIAO G Z.Proxy multi-signature scheme:A new type of proxy signature scheme[J].Electron Letter,2000;36(6): 527-528.
  • 6Ross Anderson.Two remarks on public key cryptology.Invited Lecture [C].In:The fourth ACM Computer and Communication Security,1997.
  • 7A Fiat,A Shamir.How to prove yourself:practical solutions to identification and signature problems[C].In:Advances in Cryptology-Crypto' 86,Lecture Notes of Computer Science, 1986:186-194.
  • 8M Bellare,S K Miner.A forward-secure digital signature scheme[C]. In : Advances in Cryptology-Crypto ' 99, Lecture Notes of Computer Science, 1999 : 431-448.
  • 9谭作文,刘卓军.一个前向安全的强代理签名方案[J].信息与电子工程,2003,1(4):257-259. 被引量:18
  • 10吴克力,王庆梅,刘凤玉.一种具有前向安全的数字签名方案[J].计算机工程,2003,29(8):122-123. 被引量:18

二级参考文献15

  • 1[1]Ross Anderson.Two remarks on public key cryptology. Invited Lecture [A].The fourth ACM Computer and Communication Security [C],1997.
  • 2[2]A Fiat,A Shamir.How to prove yourself:practical solutions to identification and signature problems [A].Advances in Cryptology-Crypto'86, Lecture Notes of Computer Science [C],1986,1987: 186-194.
  • 3[3]M Bellare,S K Miner. A forward-secure digital signature scheme [A]. Advances in Cryptology-Crypto'99, Lecture Notes of Computer Science [C],1999, 1666: 431-448.
  • 4[4]M Abdalla,L Reyzin. A new forward-secure digital signature scheme [A]. Asiacrypt'00, Lecture Notes of Computer Science [C], 2000,1976:116-129.
  • 5[5]L C Guillou, J J Quisquater. A "paradoxical" identity-based signature scheme resulting from zero-knowledge [A]. Advances in Cryptology-Crypto'88, Lecture Notes of Computer Science [C],1988, 403: 216-231.
  • 6[6]G Itkis,L Reyzin. Forward-secure signatures with optimal signing and verifying [A]. Advances in Cryptology-Crypto'01, Lecture Notes of Computer Science [C],2001, 2139:332-354.
  • 7[7]M Mambo,K Usuda,E Okamato. Proxy signature: Delegation of the power to sign messages [A]. IEICE Trans. Fundamentals [C],1996, E79-A: 1338-1353.
  • 8[8]Zuhua Shao. Proxy signature schemes based on factoring [A]. Information Processing Letter [J], 2003, 85: 137-143.
  • 9[9]B Lee, H Kim, K Kim. Strong proxy signature and its applications [A]. SCI2001 [C],2001, 2: 603-608.
  • 10[10]J Y Lee, J H Cheon, S Kim. An analysis of proxy signatures: Is a secure channel necessary? [A]. CT-RST 2003 [C],2003, 2612: 68-79.

共引文献34

同被引文献151

引证文献19

二级引证文献42

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部