期刊文献+

一些代理多重签名方案的安全性分析和改进 被引量:1

Security Analysis and Improvement of Some Proxy Multi-signature Schemes
在线阅读 下载PDF
导出
摘要 代理多重签名方案是现代电子商务中重要的一种数字签名,但很多代理多重签名方案是不安全的,存在各种问题.对最近提出的一些代理多重签名方案进行了安全性分析,指出这些方案是不安全的,存在不同程度的安全缺陷.为了弥补这些缺陷,提出一个新的不需要安全信道的代理多重签名方案,并对改进的方案进行了安全性和有效性分析. Proxy multi-signature scheme is an important digital signature of modern electronic business. But many of them are insecure and have some different limitations. Security analysis of some proxy multi-signature schemes proposed reTcently is presented. This paper points out that these schemes are insecure and have different security weaknesses. In order to overcome these weaknesses, a novel proxy multi-signature scheme without a secure channel is proposed, and security and efficiency analysis of the improved scheme is presented.
出处 《小型微型计算机系统》 CSCD 北大核心 2009年第4期784-787,共4页 Journal of Chinese Computer Systems
关键词 密码学 代理签名 代理多重签名 密码分析 cryptography proxy signature proxy multi-signature cryptanalysis
  • 相关文献

参考文献7

  • 1Yi L, Bai G, Xiao G. Proxy multi-signature scheme: a new type of proxy signature scheme[J]. Electronics Letters, 2000, 36 (6) :527-528.
  • 2伊丽江,白国强,肖国镇.代理多重签名[J].计算机研究与发展,2001,38(2):204-206. 被引量:31
  • 3纪家慧,李大兴.新的代理多签名体制[J].计算机研究与发展,2004,41(4):715-719. 被引量:24
  • 4Chen Tzer-Shyong, Chung Yu-fang, Hwang Gwo-Shiuan. Efficient proxy multisignature schemes based on the elliptic curve cryptosystem[J]. Computers & Security, 2003, 22 (6):527-534.
  • 5Chen Tzer-Shyong, Liu Tzuoh-Pyng, Hwang Gwo-Shiuan, et al. An improvement of proxy-protected proxy multi-signature scheme[C]. In: Proceedings of the International Conference on Information Management, 2002, 33-40.
  • 6Lu R, Cao Z, Zhou Y. Proxy blind multi-signature scheme without a secure channel[J]. Applied Mathematics and Computation, 2005,164(1):179-187.
  • 7曹天杰,林东岱,薛锐.基于椭圆曲线的代理多签名方案的安全性分析[J].小型微型计算机系统,2006,27(5):798-801. 被引量:7

二级参考文献12

  • 1[1]Mambo M, Usuda K, Okamoto E. Proxy signatures: Delegation of the power to sign messages. IEICE Trans on Fundamentals, 1996, E79-A(9): 1338~1354
  • 2[2]Kim S, Park S, Won D. Proxy signatures, Revisited. In: Proc of Int'l Conf on Information and Communications Security, LNCS 1334. Springer-Verlag, 1997. 223~232
  • 3[3]Ohta K, Okamoto T. A digital multisignature scheme based on the Fiat-Shamir Scheme. In: Advances in Cryptology-ASIACRYPT'91, Springer-Verlag, 139~148
  • 4[1]S Kim, S Park, D Won. Pxoxy signatures, revisited. In: Proc of ICICS'97, Int'l Conf on Information and Communications Security. Berlin: Springer-Verlag, 1997. 223~232
  • 5[2]M Mambo, K Usuda, E Okamoto. Proxy signature: Delegation of the power to sign messages. IEICE Trans on Fundamentals of Electronics Communications and Computer Sciences, 1996, E79-A(9): 1338~1354
  • 6[3]M Mambo, K Usuda, E Okamoto. Proxy signatures for delegation signing operation. In: Proc of the 3rd ACM Conf on Computer and Communications Security. New York: ACM Press, 1996. 48~57
  • 7[4]B Lee, H Kim, K Kim. Strong proxy signature and its applications. The 2001 IEICE Symp on Cryptography and Information Security, Oiso, Japan, 2001
  • 8[5]K Ohta, T Okamoto. A digital multisignature scheme based on the Fiat-Shamir scheme. In: Advances in Cryptology-ASIACrypt'91. Berlin: Springer-Verlag, 1991. 139~148
  • 9[6]L Yi, G Bai, G Xiao. Proxy multi-signature scheme: A new type of proxy signature scheme. Eletronic Letters, 2000, 36(6): 527~528
  • 10[7]D Johnson, A Menezes, S Vanstone. The elliptic curve digital signature algorithm(ECDSA). 1999. http://www.certicom.com/pdfs/whitepapers/ecdsa.pdf

共引文献51

同被引文献6

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部