期刊文献+

代理不可否认签名 被引量:4

Proxy undeniable signatures
下载PDF
导出
摘要 代理签名使得原始签名人可以授权代理人代理其签名,不可否认签名则使得只有签名人才能向第三方证实或否认签名的有效性。将代理签名与不可否认签名组合到一起,提出代理不可否认签名的概念,给出一个代理不可否认签名方案。该方案在决策Diffie-Hellman困难性假设下可证明是安全的。 Proxy signatures allow an original signer to entrust a proxy signer to sign messages on behalf of him. Undeniable signatures ensure that only the signer can confirm or deny the validity of a given signature to the third party. For the need of some practical applications, the proxy signature and the undeniable signature were combined together, and a new concept of proxy undeniable signature was proposed, The proxy undeniable signature scheme's security could be proved under the decisional Diffie-Hellman assumption.
出处 《计算机应用》 CSCD 北大核心 2006年第11期2592-2595,共4页 journal of Computer Applications
基金 福建省青年科技人才创新项目(2005J055) 信息安全国家重点实验室开放课题 福建省教育厅科技计划项目(JA04250)
关键词 数字签名 代理签名 不可否认签名 digital signature proxy signature undeniable signature
  • 相关文献

参考文献30

  • 1MAMBO M, USUDA K, OKAMOTO E. Proxy signatures for delegating signing operation[ A]. Proceedings of 3rd ACM Conference on Computer and Communications Security[ C]. ACM Press, 1996. 48-57. 被引量:1
  • 2ZHANG K. Threshold proxy signature schemes[ A]. 1997 Information Security Workshop[C]. Japan, 1997. 191-197. 被引量:1
  • 3ZHANG K. Nonrepudiable proxy signature schemes based on discrete logarithm problem [ EB/OL]. http://citeseer. nj. nec. com/360090. html, 1997. 被引量:1
  • 4SUN HM. Design of time-stamped proxy signatures with traceable receivers [ J]. IEE Proceedings of Computers & Digital Techniques,2000, 147(6) : 462 -466. 被引量:1
  • 5LIN WD, JAN JK. A security personal learning tools using a proxy blind signature scheme[ A]. Proccedings of International Conference on Chinese Language Computing[ C]. Illinois, USA, 2000, 273 -277: 被引量:1
  • 6YI LJ, BAI GQ, XIAO GZ. Proxy multi-signature scheme: a new type of proxy signature scheme[ J]. Electron Letters, 2000, 36(6):527 - 528. 被引量:1
  • 7HWANG SJ, SHI CH. A simple multi-proxy signature scheme[ A].Proceedings of the Tenth National Conference on Information Security[ C]. Hualien(Taiwan China), 2000. 134 - 138. 被引量:1
  • 8LEE B, KIM H, KIM K. Strong proxy signature and its application[A]. ACISP2001[C], 2001. 603-608. 被引量:1
  • 9PARK HU, LEE IY. A digital nominative proxy signature scheme for mobile communication information[ A]. ICICS 2001, LNCS 2229[C]. Berlin: Springer-Verlag, 2001. 451-455. 被引量:1
  • 10SHUM K, WEI KW. A strong proxy signature scheme with proxy signer privacy protection[ A]. WETICE 2002[ C], 2002. 55 -56. 被引量:1

同被引文献40

引证文献4

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部