期刊文献+

Nonrepudiable Proxy Multi—Signature Scheme 被引量:12

原文传递
导出
摘要 The concept of proxy signature introduced by Mambo, Usuda, and Okamotoallows a designated person, called a proxy signer, to sign on behalf of an original signer. However,most existing proxy signature schemes do not support nonrepudiation. In this paper, two securenonrepudiable proxy multi-signature schemes are proposed that overcome disadvantages of theexisting schemes. The proposed schemes can withstand public key substitution attack. In addition,the new schemes have some other advantages such as proxy signature key generation and updatingusing insecure channels. This approach can also be applied to other ElGamal-like proxy signatureschemes.
出处 《Journal of Computer Science & Technology》 SCIE EI CSCD 2003年第3期399-402,共4页 计算机科学技术学报(英文版)
基金 国家自然科学基金,国家自然科学基金,the Special Fund of China for Ph.D. Instructors in Universities
  • 相关文献

参考文献12

  • 1Mambo M, Usuda K, Okamoto E. Proxy signatures for delegating signing operation. In Proc. 3rd ACM Conference on Computer and Communications Security,ACM Press, 1996, pp.48--57.
  • 2Mambo M, Usuda K, Okamoto E. Proxy signatures:Delegation of the power to sign messages. IEICE Trans.Fundam., 1996, E79-A(9): 1338--1354.
  • 3Zhang K. Threshold proxy signature schemes. In 1997 Information Security Workshop, Japan, 1997, pp.191-197.
  • 4Kim S, Park S, Won D. Proxy signatures, revisited. In Pvoc. ICICS'97, Int. Conf. on Information and Communications Security, LNCS, Springer-Verlag, 1997,1334: 223-232.
  • 5Sun H M, Lee N Y, Hwang T. Threshold proxy signatures. In lEE Proc. Computers & Digital Techniques,1999, 146(5): 259-263.
  • 6Sun H M. An efficient nonrepudiable threshold proxy signature scheme with known signers. Computer Communications, 1999, 22(8): 717-722.
  • 7Hwang M S, Lin I C, Lu E J L. A secure nonrepudiable threshold proxy signature scheme with known signers.International Journal of Informatica, 2000, 11(2): 1-8.
  • 8Sun H M, Chen B J. Time-stamped proxy signatures with traceable receivers. In Proc. the Ninth National Conference on Information Security, 1999, pp.247-253.
  • 9Sun H M. Design of time-stamped proxy signatures with traceable receivers. In IEE Proc. Computers & Digital Techniques, 2000, 147(6): 462-466.
  • 10Yi L J, Bai G Q, Xiao G Z. Proxy multi-signature scheme: A new type of proxy signature scheme. Electron. Lett., 2000, 36: 527-528.

同被引文献103

引证文献12

二级引证文献71

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部