期刊文献+

基于前向安全的代理签名系统的研究与实现

Research and Implementation of Proxy Signature Based on Forward-Security
下载PDF
导出
摘要 代理签名是一种特殊的数字签名,它是指当某个签名人(原始签名人)由于某种原因不能签名时,将签名委托给他人(代理签名人)替代自己行使签名权。普通的代理签名算法有一个严重的缺陷:一旦签名密钥泄露,以前用该密钥签名的所有文档都失效。将前向安全理论引入到代理签名中,即使代理签名密钥泄露,以前时间段的代理签名仍然有效。同时,在本文中给出了代理签名系统模型,并给出模拟实现。 Proxy signature is a special digital signature. It allows a signatory, called an original signer, to delegate his signing capability to another called a proxy signatory, to create a signature on behalf of him whom can not sign a message for some reason. Common proxy signature has a serious defect: once key for signature disclosed, document signed by former key for signature is invalid .Therefore, in this paper, theory of forward-security be introduced into proxy signature, although key for signature is disclosed, former proxy signature is valid .And, in this paper, system model of proxy signature is given. Finally, an analog implementation is described.
出处 《芜湖职业技术学院学报》 2005年第4期14-16,共3页 Journal of Wuhu Institute of Technology
关键词 前向安全 代理签名 代理签名系统实现 Forward-security Proxy signature Implementation of System for Proxy signature.
  • 相关文献

参考文献2

二级参考文献20

  • 1R Housley,W Ford,W Polk et al.Internet X.509 Public Key Infrastructure :Certificate and CRL Profile[S].RFC1259,1999-01. 被引量:1
  • 2A Shamir.How to share a secret[J].Communications of the A CM, 1979; 22:612-613. 被引量:1
  • 3Y Desmedt,Y Frankel.Threshold cryptosystems[C].In:G Brassard ed. Advances in Cryptology-Crypto 89,Lecture Notes in Compute Science, Spring-Verlag, 1989 ; 435. 被引量:1
  • 4Ross Anderson.Invited lecture[C].In:Fourth Annum Conference on Computer and Communications Security,ACM, 1997. 被引量:1
  • 5Mihir Bellare,Sara K Miner.A forward--secure digital signature scheme[C]. In:Advances in Cryptology-CRYPTO'99,Lecture Notes in Compute Science, Spring-Verlag, 1999 ; 1666: 431-448. 被引量:1
  • 6Shafi Goldwasser,Silvio Micali,Ronald L Rivest.A digital signature scheme secure against adaptive chosen-message attaeks[J].SIAM Journal on Computing,1988;17(2):281~308. 被引量:1
  • 7Amos Fiat,Adi Shamir.How. to prove yourself:Practical solutions to identification and signature problems[C].In:Burton S Kaliski Jr ed. Advances in Cryptology-CRYPTO'86,Lecture Notes in Computer Science, Springer-Verlag, 1987 ;263 : 186-194. 被引量:1
  • 8Hugo Krawczyk.Simple forward-secure signatures from any signature scheme[C].In:Seventh ACM Conference on Computer and Communication Security ,ACM ,2000-11. 被引量:1
  • 9Tal Malkin,Daniele Micciancio,Sara Miner.Effcient generic forward-secure signatures with an unbounded number of time periods[C].In:Advances in Cryptology,Proceedings of EUROCRYPT 2002 ,Lecture Notes in Computer Science,Springer-Verlag, 2002; 2332:400-417. 被引量:1
  • 10Poinctcheval D,Stern J.Security proof for signature schemes[C].In: Advances in Cryptology-EUROCRYPTO'96,Lecture Notes in Compute Science, Spring-Verlag, 1996; 1070 : 387-398. 被引量:1

共引文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部