期刊文献+

基于身份的代理数字签名 被引量:1

ID-based Proxy Digital Signature
原文传递
导出
摘要 数字签名是密码学中长期受关注的问题。目前,数字签名的种类越来越多,比如基于身份的数字签名、代理数字签名、强数字签名等等。先提出了两个基于离散对数下的代理数字签名,并在此协议的基础上发展出基于身份的代理数字签名。此签名融合了零知识证明的知识,同时又把人的生物特征添加其中作为身份,使之具有更好的身份签名属性,这样能更好地抵抗网络木马和僵尸的攻击,即它具有smart卡的属性。 Digital signature always attracts much attention. At present, more and more types of digital signatures, such as identity-based digital signature, proxy digital signature, strong digital signature. This paper describes two proxy digital signature protocols based on discrete logarithm. And based on these, an identity-based proxy digital signature protocol is proposed, which integrates the knowledge of zero-knowledge proof while adds the human biological characteristics to ID-based signature. Thus this ID-baded proxy digital signature protocol is more resistant to network Trojans and zombie attacks, this means it has the properties of smart cards.
作者 何元禹
出处 《信息安全与通信保密》 2010年第6期74-76,81,共4页 Information Security and Communications Privacy
关键词 单向陷门置换 承诺 零知识汪明 数字签名 生物密码 one-way trapdoor permutation commitment zero-knowledgeproof digital signature hiologicalcryptography
  • 相关文献

参考文献8

  • 1Chaum D,van Antwerpen H.Undeniale Signatures[C]//Brassard G ed.Advances in Cryptology--Crypto'89.Santa Barbara:Springer-Verlag,1989:212-216.
  • 2Jakobsson M,Sako K,Pagliazzo R I.Desingated Verifier Proofs and Their Applications[C]//Saragossa.Eurocrypt 1996.Spain:Springer-Verlag.1996:143-154.
  • 3Guillou L,Qusquater J-J.A"Paradoxical"Identity-Based Signature Scheme Resulting from Zero-Knowledge[C]//Shaft Goldwasser.Advances in Cryptology-Crypto'88.Santa Barbara:Springer-Verlag,1988:216-231.
  • 4Fiat A,Shamir A.How to Prove Yourself Practical Solutions to Identification and Signature Problems[C]//Andrew M.Odlyzko ed.Advances in Cryptology-Crypto86.London:Springer-Verlag,1986:186-194.
  • 5Tatsuaki Okamoto.On Pairing-Based Cryptosystems[J].Lecture Notes in Computer Science,2006(4341):50-66.
  • 6雷永俊,刘春刚,王钢.基于身份的具有消息恢复的签名方案研究[J].信息安全与通信保密,2007,29(7):120-121. 被引量:2
  • 7Pedersen T P.Non-interactive and Information-theoretic Secure Verifiable Secret Sharing[J].Lecture Notes In Computer Science,1991,1991(576):129-140.
  • 8Jan caraenisch,Markus Michels.Proving in Zero-knowledge that a Number Is the Product of Two Safe Primes[C]//Jacques Stern.Eurocrypt 1999.Berlin:Springer-Verlag,1999:107-122.

二级参考文献7

  • 1[1]Nyberg K,Rueppel R A.Message recovery for signature schemes based on the discrete logarithm problem[A].In:Alfredo De Santis.Advances in Cryptology-EUROCRYPT'94[C].Heidelberg:Springer Berlin,1994:175-190.
  • 2[2]Horster P,Michels M,Petersen H.Authenticated encryption schemes with low communication costs[J].Electronics Letters,1994,30(15):1230-1231.
  • 3[3]Paterson K G.ID-based signatures from pairings on elliptic curves[R],.Electron.Lett,2002,38(18):1025-1026.
  • 4[4]Cha J C,Cheon J H.An Identity-Based Signature from Gap Diffie-Hellman Groups[A].In:Desmedt Y G.Public Key Cryptography-PKC 2003[C].Heidelberg:Spriinger Berlin,2003:18-30.
  • 5[5]Hess F.Efficient Identity Based Signature Schemes Based on Pairings[A].In:Nyberg K,Heys H.Selected Areas in Cryptography[C].Heidelberg:Springer Berlin,2003:310-324.
  • 6[6]Boneh D,Franklin M.Identity-Based Encryption from the Weil pairing[A].In:Kilian J.Advances in Cryptology-CRYPTO 2001[C].Heidelberg:Springer Berlin,2001:213-229.
  • 7[7]Pointcheval D,Stern J.Security proofs for signature schemes[A].In:Maurer U.Advances in Cryptology-EUROCRYPT' 96[C].Heidelberg:Springer Berlin,1996:387-398.

共引文献1

同被引文献2

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部