期刊文献+

基于身份的前向安全门限代理签名方案 被引量:1

ID-based Forward Secure Threshold Proxy Signature Scheme
在线阅读 下载PDF
导出
摘要 利用双线性对和基于身份密码体制理论,提出基于身份的前向安全门限代理签名方案。该方案实现了代理签名密钥的定期更新,有效提高了代理签名的安全性。分析结果表明,该方案安全可靠,具有前向安全性、后向安全性和匿名性。 In terms of bilinear pairing and identity-related cryptography, a forward secure threshold proxy signature scheme is pro- posed. The scheme realizes the periodic updating of the proxy signature key, and effectively improves the security of proxy signa- ture. The analysis results show that the proposed scheme is safe and reliable, and has forward security, backward security and anonymity.
作者 李村 李志华
出处 《计算机与现代化》 2016年第10期72-76,83,共6页 Computer and Modernization
基金 江苏省科技厅产学研前瞻项目(BY2013015-23)
关键词 基于身份 门限代理签名 前向安全 后向安全 匿名性 ID-based threshold proxy signature forward secure backward secure anonymity
  • 相关文献

参考文献16

  • 1Shamir A. Identity-based cryptosystems and signature schemes [ C ]// Proceedings of Crypto. New York: Springer-Verlag, 1954:47-53.
  • 2Fiat A, Shamir A. How to prove yourself: Practical solu- tions to identification and signature problems [ C ]// Ad- vances in Cryptology ( CRYPTO' 86 ). Berlin: Springer, 1986 : 186-194.
  • 3Guillou L, Quisquater J J. A paradoxical identity-based sig- nature scheme resulting from zero-knowledge [ C ]// Ad- vances in Cryptology ( CRYPTO ' 88 ). Berlin: Springer, 1988:216-231.
  • 4Mambo M, Usuda K, Okamoto E. Proxy signatures for del- egating signing operation ~ C ]// Proceedings of the 3rd ACM Conference on Computer and Communications Securi- ty. 1996:48-57.
  • 5Mambo M, Usuda K, Okamoto E. Proxy signature: Dele- gation of the power to sign messages [ J 1. IEICE Transac- tions on Fundamentals of Electronics, Communications and Computer Sciences, 1996, E79-A(9) : 1338-1353.
  • 6Zhang Kan. Threshold proxy signature schemes [ M ]// In- formation Security. Berlin:Springer-Verlag, 1997:282-290.
  • 7Hsu C, Wu T, Wu T. New nonrepudiable threshold proxy signature scheme with known signers [ J ]. Journal of Sys- tems and Software, 2001,58 (2) : 119-124.
  • 8Hu Jianghong, Zhang Jianzhong. Cryptanalysis and improve- ment of a threshold proxy signature schem [ J 1- Computer Standards & Interfaces, 2009,31 ( 1 ) : 169-173.
  • 9Anderson R. Invited lecture [ C ]// Proceedings of the 4th ACM Conference on Computer and Communications Securi- ty. 1997:1-7.
  • 10高欢欢,张建中.一种基于身份的门限代理签名方案[J].计算机工程,2012,38(1):132-134. 被引量:3

二级参考文献56

共引文献43

同被引文献9

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部