期刊文献+

凭证型代理签名体制的安全性研究 被引量:9

security research for delegation- of- certification proxy signature systems
在线阅读 下载PDF
导出
摘要 本文首先讨论了代理签名体制的可证安全性,为代理签名的可证安全建立了理论基础,同时为研究凭证型代理签名体制的安全性提出了一种形式化模型,该模型定义了攻击者的能力和安全目标;然后用该模型分析了一个具体的代理签名体制的例子,证明了这个代理签名方案在随机预言模型下是可证安全的。 This paper arguments the provable-security of proxy signature systems and provides theoretical foundations for the provable-security of proxy signature primitive. We present a formal model for the security of delegation-of-certification proxy signature schemes, which defines the capabilities of the adversary and the security goals to capture which mean for a proxy signature scheme to be secure. Then, we present an examples of proxy signature scheme that can be proven secure in the random oracle model respectively.
出处 《微计算机信息》 北大核心 2005年第12X期52-54,84,共4页 Control & Automation
基金 河南省自然科学基金(批准号SP200304098)资助
关键词 代理签名体制 可证安全 proxy signature schemes provable security security model
  • 相关文献

参考文献5

  • 1M.Mambo,K.Usuda,and E.Okamoto,"Proxy Signature:Delegation of the Power to Sign Messages",IEICE Trans.Fundamentals,E79-A:9,pp.1338-1353,1996.
  • 2B.Lee,H.Kim,and K.Kim.Strong proxy signature and its applications.In:Proc.of the 2001 Symposium on Cryptography and Information Security (SCIS' 01),vol 2/2 pp.603-608.Oiso,Japan,Jan.23-26,2001.
  • 3M.Mambo,K.Usuda,E.Okamoto.Proxy signatures for delegating signing operation.In:3rd ACM Conference on Computer and Communications Security (CCS' 96),pp.48-57.New York:ACM Press,1996.
  • 4Zuowen Tan,Zhuojun Liu.Provably Secure Delegation-by-Certification Proxy Signature Schemes.http://eprint.iacr.org/2004/148.
  • 5S.Kim,S.Park,and D.Won.Proxy signatures,revisited.In:Information and Communications Security (ICICS' 97),LNCS 1334,pp.223-232,1997.Berlin:Springer-Verlag,1997.

同被引文献27

引证文献9

二级引证文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部