期刊文献+

具有前向安全性的代理签名方案 被引量:1

A New Efficient Forward-Secure Proxy Signature Scheme
下载PDF
导出
摘要 该文提出了一种前向安全的代理签名方案,该方案基于零知识证明协议,在离散对数和二次剩余问题困难性的假设和随机oracle模型下系统是安全的.并且该系统使得原始签名者和代理签名者的秘密钥都具有前向安全性.该方案弥补了代理签名体制在密钥安全性上的不足,秘密钥的前向安全性有效控制了密钥安全风险. A new forward-secure proxy signature scheme is proposed . The scheme is proven to be forward secure based on the assumption of the logarithm, quadric remain problems in the random oracle model, Further more, security analysis of the proposed scheme is presented, the scheme made the secret key of the original signer and the proxy signer have forward secure, it make up the lack of the proxy signature scheme in the safety of the secret key, Forward security of the secret key be good for controlling the safety risk.
作者 邓娜 周梦
出处 《江西师范大学学报(自然科学版)》 CAS 北大核心 2006年第2期120-122,126,共4页 Journal of Jiangxi Normal University(Natural Science Edition)
基金 国家自然科学基金资助项目(60473019)
关键词 代理签名 前向安全 零知识证明 proxy signature forward-secure zero-knowledge proof
  • 相关文献

参考文献8

  • 1New Dehli.Proc 3rd ACM conference on computer and communications security[C].New York:ACM Press,1996. 被引量:1
  • 2Wiener M.Proceedings of Crypto'99[C].Berlin:Springer-Verlag,1999. 被引量:1
  • 3Feigenbaum J.Overview of interactive of proof systems and zero-knowledge[M].New York:IEEE Press,1992.423-439. 被引量:1
  • 4Kaliski B.Advances in cryptology-cRYPY' 97,lecture notes in compute science[C].Berlin:Springer-Verlag,1997. 被引量:1
  • 5Imai H,Rivestt R L.Proceedings of the first annual conference on computer and communications security[C].Berlin:Springer-Verlag,1993. 被引量:1
  • 6Goldwasser S.Miclis probabilistic encryption[J].Journal of computer and system,1993,28 (2):270-299. 被引量:1
  • 7王尚平,王育民,王晓峰,秦波,张亚玲.基于零知识证明的前向安全数字签名方案[J].通信学报,2003,24(9):42-47. 被引量:21
  • 8Maurer U.Advances in cryptology-Eurocrypto' 96[C].Berlin:Spring-Verlag,1996. 被引量:1

二级参考文献8

  • 1BELLARE M, MINER S. A forward-secure digital signature scheme[A]. Advances in Cryptology-CRYPTO'99,Lecture Notes in Compute Science[C]. Spring-Verlag, 1999.431-448. 被引量:1
  • 2RIVEST R, SHAMIR A, ADLMAN L. A method for obtaining digital signatures and public-key cryptosystems[J].Communlcations ACM, 1978, 21(2):120-126. 被引量:1
  • 3POINCTCHEVAL D, STERN J. Security proof for signature schemes[A]. Advances in Cryptology-EUROCRYPTO'96, Lecture Notes in Compute Science Vol. 1070[C]. Spring-Verlag, 1996. 387-398. 被引量:1
  • 4GOLDWASSER S, MICLIS. Probabilistic encryption[J]. Journal of computer and system, 1984, 28(2):270-299. 被引量:1
  • 5BELLARE M, ROGAAWAY P. Random oracles are practical: a paradigm for designing efficient protocols[A]. Proceedings of the First Annual Conference on Computer and Communications Security[C]. 1993.1-20. 被引量:1
  • 6BELLARE M, ROGAAWAY P. The exact security of digital signatures: How to sign with RSA and Rabin[A]. Advances in Cryptology-EUROCRYPTO'96, Lecture Notes in Compute Science[C]. Spring-Verlag, 1996. 399-416. 被引量:1
  • 7CAMENISCH J, STADLER M. Efficient group signatures schemes for large groups[A]. Advances in Cryptology-CRYPT'97, Lecture Notes in Compute Science[C]. Berlin: Springer-Verlag, 1997.410-423. 被引量:1
  • 8POINCTCHEVAL D, STERN J. Security arguments for digital signatures[J]. Journal of Cryptology, 2000, 113(3):361-396. 被引量:1

共引文献20

同被引文献8

引证文献1

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部