期刊文献+

一种基于椭圆曲线密码机制的门限代理签名方案 被引量:4

Threshold Proxy Signature Scheme Based on Elliptic Curve Cryptography
在线阅读 下载PDF
导出
摘要 2000年Hsu等人基于Sun的门限代理方案和E lGamal离散对数密码机制提出了一种新的具有已知代理人的不可否认的门限代理签名方案。该方案能满足代理签名的基本要求,并且能有效地抵御协作攻击和伪造攻击。然而,E lGamal离散对数密码机制具有诸如密钥过长、密钥管理难这样的缺陷,这些缺陷极大地限制了Hsu的方案在实际中的应用。因此将具有“短密钥”优势的椭圆密码机制引入该方案,提出一个基于椭圆曲线密码机制的门限代理方案。 In 2000, Hsu et al. presented a new nonrepudiable proxy signature scheme with known signers based Sun' scheme and discrete logarithm cryptography. The scheme meets several fundamental requirements and can effectively withstand the conspiracy attack and the forgery attack. However, discrete logarithm cryptography has some drawbacks like longer keys and difficult key management, which seriously limit application of the scheme proposed by Hsu et al. In allusion to this, this paper proposes a threshold proxy scheme based on elliptic curve cryptography with an advantage of short keys.
作者 冯朝胜 袁丁
出处 《计算机应用研究》 CSCD 北大核心 2006年第7期108-110,共3页 Application Research of Computers
基金 国家自然科学基金资助项目(60473030) 高等学校博士点基金资助项目(20020613020) 四川省科技厅应用基础研究资助项目(04JY029-051-1) 四川省教育厅重点课题基金资助项目(2003A085) 四川师范大学重点支持课题
关键词 数字签名 代理签名 门限代理签名 椭圆曲线 拉格朗日插值定理 Digital Signature Proxy Signature Threshold Signature Elliptic Curve Lagrange Interpolation Formula
  • 相关文献

参考文献11

  • 1Mambo M, et al, Proxy Signatures: Delegation of the Power to Sign Messages [J]. IEICE Transactions on Fundamentals of Electronic Communication and Computer Science, 1996, E79-A (9): 1338-1354,
  • 2Mambo M, Usuda K Okamoto, Proxy Signatures for Delegating Signing Operation[C]. Proceedings of the 3rd ACM Conference on Computer and Communications, Security, ACM, New York,1996.48-57.
  • 3Sun H M. An Efficient Nonrupudiable Threshold Proxy Signature Scheme with Known Signers[J]. Computer Communications, 1999,22(8):717-722.
  • 4ElGamal. A Public-key Cryptosystem and a Signature Scheme Based on Discreter Logarithms [J]. IEEE Transactions on Information Theory, 1985, IT-31(4):469-472.
  • 5Hsu CL, Wu TS, Wu TC. New Nonrepudiable Threshold Proxy Signature Scheme with Known Signers[J]. Journal of Systems and Software, 2001, (58): 119-124.
  • 6范恒英,何大可,卿铭.公钥密码新方向:椭圆曲线密码学[J].通信技术,2002,35(7X):82-84. 被引量:13
  • 7Wade Trappe, Lawrence C Washington. Introduction to Cryptography with Coding Theory[M]. Pearson Education, 2002.
  • 8邹永辉,严亚俊,马文平.椭圆曲线密码体制的实现及发展现状简介[J].计算机时代,2005(1):15-16. 被引量:6
  • 9D E R Denning. Cryptograthy and Data Security[M]. Addison-Wesley, Reading, MA,1983.
  • 10C L Hsu, T S Wu, T C Wu. Improvement of Threshold Proxy Signature Scheme[J]. Appl. Math. Comput, 2003, (136): 315-321.

二级参考文献9

  • 1王育民,通信网的安全.理论与技术,1999年
  • 2Man Youngrhce,Cryptography and secure communications,1994年
  • 3N.Koblitz,Elliptic curve cryptosystems,Math.Comp,48,203~209,1987.
  • 4V.Miller,Use of elliptic curve in cryptography,In [C85],417~426
  • 5I.F.Blake,G.Seroussi and N.P.Smart,Elliptic Curves in Cryptography, Cambridge university Press, 1999.
  • 6SECG.SEC1:EllipticCurveCryptography[]..2000
  • 7NIST.FIPSPUB186-1:DigitalSignatureStandard[].NationalInstituteofStandardsandTechnology.1994
  • 8熊金涛,刘红秀,皮德忠.Lucas公钥密码体制及其安全性[J].电子科技大学学报,1999,28(4):397-401. 被引量:4
  • 9向茜,刘钊.伽罗华域上代数运算的最简实现[J].电子科技大学学报,2000,29(1):5-9. 被引量:21

共引文献52

同被引文献24

引证文献4

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部