期刊文献+

基于椭圆曲线密码的安全门限代理签名方案 被引量:3

Secure Threshold Proxy Signature Scheme Based on Elliptic Curve Cryptography
在线阅读 下载PDF
导出
摘要 现有的门限代理签名方案大多基于有限域乘法群上的离散对数。基于ElGamal离散对数的密码机制存在密钥过长、密钥管理难等缺陷。该文针对上述缺陷,提出一个基于椭圆曲线密码机制的门限代理方案,满足了门限代理签名的性质,且能抵抗合谋攻击。 Most threshold proxy signature schemes are constructed on the base of discrete logarithm in infinite fields. Discrete logarithm cryptography based on ElGamal has some drawbacks such as long keys and difficult key management, which seriously limit its practical application. Elliptic curve cryptography is introduced and a threshold proxy signature scheme based on the cryptography is proposed, which can satisfy the properties of the threshold proxy signature, and withstand the conspiracy attack.
出处 《计算机工程》 CAS CSCD 北大核心 2008年第24期170-171,174,共3页 Computer Engineering
基金 国家自然科学基金资助项目(10501053)
关键词 代理签名 门限代理签名 椭圆曲线 合谋攻击 proxy signature threshold proxy signature elliptic curve conspiracy attack
  • 相关文献

参考文献9

  • 1Mambo M, Usuda K, Okamoto E. Proxy Signature: Delegation of the Power to Sign Messages[J]. IEICE Trans. on Fundamental, 1996, E79-A(9): 1338-1353.
  • 2Kim S, Park S, Won D. Proxy Signature, Revisited[C]//Proc. of International Conference on Information and Communication Security. [S. l.]: Springer-Verlag, 1997: 223-232.
  • 3Sun Hung-Min. An Efficient Nonrepudiable Threshold Proxy Signature Scheme with Known Signers[J]. Computer Communication, 1997, 22(8): 717-722.
  • 4Sun Hung-Min. Threshold Proxy Signatures[J]. IEEE Proceedings of Computers and Digital Techniques, 1999, 146(5): 259-263.
  • 5王晓明,张震,符方伟.一个安全的门限代理签名方案[J].电子与信息学报,2006,28(7):1308-1311. 被引量:7
  • 6Hsu C L, Wu T S, Wu T C. New Nonrepudiable Threshold Proxy Signature Scheme with Known Signers[J]. Journal of Systems and Software, 2001, 58(9): 119-124.
  • 7Hwang Min-Shiang, Lu Eric Jui-Lin, Hwang luon-Chang. A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem[J]. Knowledge and Data Engineering, 2003, 15(6): 1552-1560.
  • 8范恒英,何大可,卿铭.公钥密码新方向:椭圆曲线密码学[J].通信技术,2002,35(7X):82-84. 被引量:13
  • 9秦志光.密码算法的现状和发展研究[J].计算机应用,2004,24(2):1-4. 被引量:55

二级参考文献11

  • 1Kim S, Park S, Won D. Proxy signature, revisited, ICICS'97,Lecture Notes in Computer Science, Springer, Berlin,1997, 1334:223 - 232.
  • 2Zhang K. Threshold proxy signature scheme. 1997 Information Security Workshop, Tokyo, Japan, September, 1997:191 - 197.
  • 3Sun H M. An efficient nonrepudiable threshold proxy signature scheme with known signers. Computer Communication. 1997, 22(8):717- 722.
  • 4Hwang M S, Lu J L, Lin L C. A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem. IEEE Trans.on Knowledge and Data Engineering, 2003,15(6): 1552 - 1560.
  • 5Sun, H M Lee, N Y Hwang, T. Threshold proxy signatures, IEE Proc- Computers and Digital Techniques, 1999, 146(5):259 - 263.
  • 6Hsu C L, Wu T S, Wu T C. New nonrepudiable threshold proxy signature scheme with known signers. Journal of Systems and Software, 2001, 58 (9): 119 - 124.
  • 7Lee N Y, Hwang T, Wang C H. On Zhang's nonrepudiable proxy signatures. ACISP'98, Lecture Notes in Computer Science,Springer, Berlin, 1998:414 - 422,
  • 8Pedersen, Distributed provers with applications to undeniable signatures. Proc, Eurocrypt'91, Lecture Notes in Computer Science, Sprinter, Berlin, 1991, 547:221 - 238.
  • 9SECG.SEC1:EllipticCurveCryptography[]..2000
  • 10NIST.FIPSPUB186-1:DigitalSignatureStandard[].NationalInstituteofStandardsandTechnology.1994

共引文献71

同被引文献25

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部