期刊文献+

基于离散对数的保护签名者隐私的门限代理签名方案

A Threshold Proxy Signature Based on Discrete Logarithmic with Its Signers' Privacy Protected
下载PDF
导出
摘要 提出了一个新的(t,n)门限代理签名方案,安全性是基于离散对数和安全单向函数的.该方案结合了门限和代理签名的特性,对代理签名者实行了身份隐藏,并保证了匿名身份的可追查性;能够抵抗合谋攻击,保证了代理签名的不可否认性和不可冒充性,并实现了原始签名人安全地把委托信息传递给密钥管理中心. Based on the security of the discrete logarithmic problem and the safe one-way function. This paper proposes a new (t, n) threshold proxy signature scheme which combines the characteristic of threshold and proxy signature. In this scheme, the proxy signers' identity is hidden, and traceable of anonymity is assure. Also, this scheme can resist the joint cheating, and insure the irreversibility and non-imitation.
作者 田珂 楼树美
出处 《河南工程学院学报(自然科学版)》 2008年第4期51-54,共4页 Journal of Henan University of Engineering:Natural Science Edition
关键词 离散对数 门限 代理签名 discrete logarithmic threshold proxy signature
  • 相关文献

参考文献3

二级参考文献68

  • 1李继国,曹珍富,张亦辰.Improvement of M-U-O and K-P-W proxy signature schemes[J].Journal of Harbin Institute of Technology(New Series),2002,9(2):145-148. 被引量:10
  • 2CHAUM D, EVERTSE J H, GRAFF J V. An improved protocol for demonstrating possession of discrete logarithms and some generalizations[A]. Proceedings of Eurocrypt'87 [C]. 1988. 127-141. 被引量:1
  • 3CHAUM D, EVERTSE J H, GRAFF J V, et al. Domonstrating possession of a discrete logarithm without levealing it[A]. Proceedings of Crypt'86 [C]. 1987. 200-212. 被引量:1
  • 4LANDFORD S. Weakness in some threshold cryptosystems [A]. Proc of Crypto'96 [C]. 1996. 74-82. 被引量:1
  • 5MAMBO M, USUDA If., OKAMOTO E. Proxy signatures for delegating signing operation[A]. Proc 3rd ACM Conference on Computer and Communications Security[C]. ACM Press, 1996. 48-57. 被引量:1
  • 6MAMBO M, USUDA K, OKAMOTO E. Proxy signatures: delegation of the power to sign messages[J]. IEICE Trans Fundam, 1996,E79-A (9): 1338-1354. 被引量:1
  • 7ZHANG IC Threshold proxy signature schemes[A]. 1997 Information Security Workshop[C]. Japan, 1997. 191-197. 被引量:1
  • 8SUN H M. LEE N Y. HWANG T. Threshold proxy signatures[J], IEE Proc Computers & Digital Techniques, 1999, 146(5): 259-263. 被引量:1
  • 9KIM S, PARK S, WON D. Proxy signatures, revisited [A]. Proc ICICS'97[C]. Int Conf on Information and Communications Seurity,LNCS, Springer-Verlag, 1997. 1334: 223-232. 被引量:1
  • 10SUN H M. An efficient nonrepudiable threshold proxy signature scheme with known signers[J]. Computer Communications, 1999,22(8): 717-722. 被引量:1

共引文献77

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部