期刊文献+

代理密钥传送分析

Analysis of transmission of proxy signature key
下载PDF
导出
摘要 结合身份认证,给出了两个可以在公开信道上传送代理密钥的方案.在所给的方案中,原始签名人Alice能够确认接收到代理密钥的就是其拟定的代理签名人Bob. In line with authentication, two schemes for transmitting proxy signature key in public channels were proposed in this paper. In our schemes, the original signer, Alice, can confirm that the proxy signer whom she wants to delegate her signing capability to, receive the proxy signature key.
出处 《海南师范学院学报(自然科学版)》 CAS 2005年第3期211-213,共3页 Journal of Hainan Normal University:Natural Science
基金 黑龙江省博士后科研基金项目(01043)
关键词 代理签名 代理密钥 不安全信道 proxy signature proxy signature key insecure channels
  • 相关文献

参考文献3

二级参考文献22

  • 1Yi L J, Bai G Q, Xiao G Z. Proxy multi-signature scheme: A new type of proxy signature scheme. Electron. Lett., 2000, 36: 527-528. 被引量:1
  • 2Hwang S J, Shi C H. Specifiable proxy signature schemes. In 1999 Computer Symposium, Taipei, 1999,pp.190-197. 被引量:1
  • 3E1Gamal T. A public key cryptosystem and signature scheme based on discrete logarithms. IEEE Trans.,1985, IT-31(4): 469--472. 被引量:1
  • 4Sun H M, Chen B J. Time-stamped proxy signatures with traceable receivers. In Proc. the Ninth National Conference on Information Security, 1999, pp.247-253. 被引量:1
  • 5Sun H M. Design of time-stamped proxy signatures with traceable receivers. In IEE Proc. Computers & Digital Techniques, 2000, 147(6): 462-466. 被引量:1
  • 6Mambo M, Usuda K, Okamoto E. Proxy signatures for delegating signing operation. In Proc. 3rd ACM Conference on Computer and Communications Security,ACM Press, 1996, pp.48--57. 被引量:1
  • 7Mambo M, Usuda K, Okamoto E. Proxy signatures:Delegation of the power to sign messages. IEICE Trans.Fundam., 1996, E79-A(9): 1338--1354. 被引量:1
  • 8Zhang K. Threshold proxy signature schemes. In 1997 Information Security Workshop, Japan, 1997, pp.191-197. 被引量:1
  • 9Kim S, Park S, Won D. Proxy signatures, revisited. In Pvoc. ICICS'97, Int. Conf. on Information and Communications Security, LNCS, Springer-Verlag, 1997,1334: 223-232. 被引量:1
  • 10Sun H M, Lee N Y, Hwang T. Threshold proxy signatures. In lEE Proc. Computers & Digital Techniques,1999, 146(5): 259-263. 被引量:1

共引文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部