期刊文献+

前向安全的基于身份代理签名方案 被引量:4

Forward secure ID-based proxy signature scheme
在线阅读 下载PDF
导出
摘要 前向安全是数字签名方案的一个重要的方面。现在已经提出了许多前向安全的数字签名方案,但前向安全的代理签名方案到目前为止并不多。提出了一个前向安全的基于身份的代理签名方案,方案的安全参数与总的时间周期数量无关可以在保证代理签名者私钥长度和公钥保持不变的条件下无限制的进行代理私钥更新。由于双线性配对的使用,方案具有短签名和短密钥的特点。最后给出了代理签名方案的安全性分析。 The forward secure property is important in digital signature schemes. Many schemes have been proposed for the forward secure signature. Among them, only a few is proposed for the forward secure proxy signature. A forward secure ID-based proxy signature scheme is proposed. The scheme requires the general security parameters only independent to the total number of time periods. The scheme can perform key update for unlimited time periods while maintaining sizes ofkeys and signature fixed. For using bilinear pairings, the scheme possesses the characteristic of short signature and short key. At last. the security of this scheme is analyzed
出处 《计算机工程与设计》 CSCD 北大核心 2007年第21期5103-5104,5326,共3页 Computer Engineering and Design
基金 国家973重点基础研究发展计划基金项目(G1999035802) 国家863高技术研究发展计划基金项目(2001AA141120)
关键词 前向安全 基于身份的签名 代理签名 双线性配对 密钥更新 forward secure ID-based signature proxy signature bilinear pairing key update
  • 相关文献

参考文献8

  • 1李继国,曹珍富,李建中,张亦辰.代理签名的现状与进展[J].通信学报,2003,24(10):114-124. 被引量:56
  • 2Xu Jing,Zhang Zhen-feng,Feng Deng-guo.Id-based proxy signature using bilinear pairings[DB/OL].http://eprint.iacr.org,2004.
  • 3Bao Hai-yong, Cao Zhen-fu, Wang Sheng-bao. Identity-based threshold proxy signature scheme with known signers [Z]. TAMC,2006.
  • 4Bellare M,Miner S.A forward-secure digital signature scheme [C]. M Wiener Crypto of LNCS. Berlin: Springer-Verlag, 1999: 431-448.
  • 5Duc-Liem Vo,Kwangjo Kim.Yet another forward secure signature from bilinear pairings[R].Korea:ICISC,2005.
  • 6Abdalla M, Reyzin L. A new forward-secure digital signature scheme [C]. Advances in Cryptology-Asiacrypt LNCS. Berlin: Springer-Verlag,2000:116-129.
  • 7Abdalla M, Miner S,Namprempre C.Forward-secure threshold signature schemes [C]. Topics in Cryptology CT-RSA LNCS. Berlin:Springer-Verlag, 2001:441-456.
  • 8王天银,张建中.一个新的前向安全的代理数字签名方案[J].计算机工程与应用,2005,41(25):133-135. 被引量:19

二级参考文献61

  • 1李继国,曹珍富,张亦辰.Improvement of M-U-O and K-P-W proxy signature schemes[J].Journal of Harbin Institute of Technology(New Series),2002,9(2):145-148. 被引量:10
  • 2CHAUM D, EVERTSE J H, GRAFF J V. An improved protocol for demonstrating possession of discrete logarithms and some generalizations[A]. Proceedings of Eurocrypt'87 [C]. 1988. 127-141.
  • 3CHAUM D, EVERTSE J H, GRAFF J V, et al. Domonstrating possession of a discrete logarithm without levealing it[A]. Proceedings of Crypt'86 [C]. 1987. 200-212.
  • 4LANDFORD S. Weakness in some threshold cryptosystems [A]. Proc of Crypto'96 [C]. 1996. 74-82.
  • 5MAMBO M, USUDA If., OKAMOTO E. Proxy signatures for delegating signing operation[A]. Proc 3rd ACM Conference on Computer and Communications Security[C]. ACM Press, 1996. 48-57.
  • 6MAMBO M, USUDA K, OKAMOTO E. Proxy signatures: delegation of the power to sign messages[J]. IEICE Trans Fundam, 1996,E79-A (9): 1338-1354.
  • 7ZHANG IC Threshold proxy signature schemes[A]. 1997 Information Security Workshop[C]. Japan, 1997. 191-197.
  • 8SUN H M. LEE N Y. HWANG T. Threshold proxy signatures[J], IEE Proc Computers & Digital Techniques, 1999, 146(5): 259-263.
  • 9KIM S, PARK S, WON D. Proxy signatures, revisited [A]. Proc ICICS'97[C]. Int Conf on Information and Communications Seurity,LNCS, Springer-Verlag, 1997. 1334: 223-232.
  • 10SUN H M. An efficient nonrepudiable threshold proxy signature scheme with known signers[J]. Computer Communications, 1999,22(8): 717-722.

共引文献70

同被引文献31

  • 1王晓明,陈火炎,符方伟.前向安全的代理签名方案[J].通信学报,2005,26(11):38-42. 被引量:35
  • 2张波,徐秋亮.一个强前向安全的代理签名方案[J].计算机工程与应用,2006,42(9):109-110. 被引量:9
  • 3张学军,王育民.高效的基于身份的代理签密[J].计算机工程与应用,2007,43(3):109-111. 被引量:14
  • 4王亮,贾小珠.基于离散对数的前向安全代理签名方案[J].青岛大学学报(自然科学版),2007,20(2):46-49. 被引量:10
  • 5Mambo M, Usuda K, Okamoto E.Proxy signature: delegation of thepower to sign messages[J].IEE Transactions on Fundamentals, ]996, E792A (9): 1338-1353
  • 6Axelsson S.Intrusion detection systems:a survey and taxonomy, No99-15[R].Dept of Computer Engineering,Chalmers University of Technology, 2000-03
  • 7Au Wai-Ho ,Chart K C C. FARM: a data mining system for discovering fuzzy association rules[C]//The 1999 IEEE International FuzzySystems Conference, FUZZ-IEEE' 99,Seoul,South Korea,22 Aug. -25 Aug. 1999, c1999,55:1217-1222
  • 8BaoHai-yong, Caozhen-fu, WangSheng-bao, Identity-based threshold proxy signatures scheme with known , signers [Z].TAMC, 2006
  • 9Li Xiang-xue, Chen Ke-fei. Identity based proxy-signcryptions theme from pairings[C]//Zhang Liang-jie, Li Ming-lu, Amit P S, et al. Proceedings of the IEEE International Conference on Set-vices Computing(SCC 2004).Los Alamitos, California: IEEE Computer Society Press, 2004: 494-497
  • 10Wang Meng, Li Hui, Liu Zhi-jing. Efficient identity based proxy-inscription schemes with forward security and public verifiability.[C]//Lu Xi-change, Zhao Wei. The Third International Conference on Networking and Mobile Computing (ICCNMC 2005) .Berlin: Springer-Vela, 2005, 3619: 982-991

引证文献4

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部