期刊文献+

代理者指定验证者的代理签名体制

Proxy -Nominative Proxy Signature Scheme
原文传递
导出
摘要 在提名的代理签名方案中,只有被提名者能验证签名的有效性。文中分析了Park Lee提出的提名代理签名,指出他的签名体制是不安全的。最后,提出一种代理签名者提名的代理签名体制,这种签名体制能克服以上弱点。 In a nominative proxy signature scheme, only the nominee can verify the signature.In this paper, we analyze the nominative proxy scheme proposed by Park Lee. We point out that the scheme presented by Park Lee is insecure and the scheme cannot provide non-repudiation. Finally we present our proxy-nominative proxy signature schemes which overcome the weakness mentioned above.
出处 《信息安全与通信保密》 2006年第3期65-67,共3页 Information Security and Communications Privacy
关键词 签名 被提名的签名 代理签名 安全 signature nominative signature proxy signature security
  • 相关文献

参考文献4

  • 1[1]Mambo M.Proxy signatures for delegating signing operation[A].Proc 3rd ACM Conference on Computer and Communications Security[C],ACM Press,1996:48-57
  • 2李继国,曹珍富,李建中,张亦辰.代理签名的现状与进展[J].通信学报,2003,24(10):114-124. 被引量:56
  • 3[3]Dai J Z,Yang X H,Dong J X.Designated-receiver proxy signature scheme for electronic commerce.Proc.of IEEE International Conference on Systems,Man and Cybernetics,Oct.5-8,2003; 1:384~389
  • 4[4]Lee B,Kim H.Strong proxy signgture and its applications.Proceedings of SCIS,2001:603-608

二级参考文献48

  • 1李继国,曹珍富,张亦辰.Improvement of M-U-O and K-P-W proxy signature schemes[J].Journal of Harbin Institute of Technology(New Series),2002,9(2):145-148. 被引量:10
  • 2CHAUM D, EVERTSE J H, GRAFF J V. An improved protocol for demonstrating possession of discrete logarithms and some generalizations[A]. Proceedings of Eurocrypt'87 [C]. 1988. 127-141.
  • 3CHAUM D, EVERTSE J H, GRAFF J V, et al. Domonstrating possession of a discrete logarithm without levealing it[A]. Proceedings of Crypt'86 [C]. 1987. 200-212.
  • 4LANDFORD S. Weakness in some threshold cryptosystems [A]. Proc of Crypto'96 [C]. 1996. 74-82.
  • 5MAMBO M, USUDA If., OKAMOTO E. Proxy signatures for delegating signing operation[A]. Proc 3rd ACM Conference on Computer and Communications Security[C]. ACM Press, 1996. 48-57.
  • 6MAMBO M, USUDA K, OKAMOTO E. Proxy signatures: delegation of the power to sign messages[J]. IEICE Trans Fundam, 1996,E79-A (9): 1338-1354.
  • 7ZHANG IC Threshold proxy signature schemes[A]. 1997 Information Security Workshop[C]. Japan, 1997. 191-197.
  • 8SUN H M. LEE N Y. HWANG T. Threshold proxy signatures[J], IEE Proc Computers & Digital Techniques, 1999, 146(5): 259-263.
  • 9KIM S, PARK S, WON D. Proxy signatures, revisited [A]. Proc ICICS'97[C]. Int Conf on Information and Communications Seurity,LNCS, Springer-Verlag, 1997. 1334: 223-232.
  • 10SUN H M. An efficient nonrepudiable threshold proxy signature scheme with known signers[J]. Computer Communications, 1999,22(8): 717-722.

共引文献55

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部