期刊文献+

一种代理签名方案的分析与改进 被引量:2

Analysis and Improvement of A Proxy Signature Scheme
原文传递
导出
摘要 在一个指定接收者的签名方案中,只有指定的接收人才能验证签名的有效性。2004年,Dai提出了一个指定接收人的代理签名方案。通过对Dai方案进行安全性分析,发现由于存在一个悬孤因子,它是不安全的,不能抵抗内部伪造攻击。所以,该签名方案不符合数字签名所必须满足的不可伪造性和不可否认性原则。针对此方案的缺陷,进行了伪造性攻击,并提出了两种改进的方案,改进后的方案满足了代理签名的安全性要求。 In a designated receiver signature scheme, only the designated receiver could verify the signature. In 2004, a designated receiver proxy signature scheme is proposed by Dai. The security of Dai-scheme is analyzed. The analysis shows that Dai-scheme is insecure to the forgery attack. Because of a hanging isolated factor, Dai-scheme could not meet the needs of digital signature, such as nonforgeability and nondeniability. To avoid these attacks, the old scheme is modified and two improved schemes are given. The improved schemes could satisfy the required security properties of the oroxv signature.
作者 张慧
出处 《信息安全与通信保密》 2009年第11期74-75,78,共3页 Information Security and Communications Privacy
关键词 数字签名 代理签名 强不可伪造性 伪造攻击 digital signature proxy signature strong nonforgeability forgery attack
  • 相关文献

参考文献4

二级参考文献23

  • 1谷利泽,李中献,杨义先.不需要可信任方的匿名代理签名方案[J].北京邮电大学学报,2005,28(1):48-50. 被引量:24
  • 2[1]Mambo M,Usuda K,Okamoto E.Proxy signature Delegation of the power to sign messages[A].IEICE Trans on Fundamentals[C].1996,E79-A(9):1338-1354 被引量:1
  • 3[2]Shum K,Wei V K.A strong proxy signature scheme with proxy signer privacy protection[A].Proceedings of the Eleventh IEEE International Workshops on Enabling Technologies:Infrastructure for Collaborative Enterprises (WETICE' 02),Pittsburgh,Pennsylvania,USA,2002:55-56 被引量:1
  • 4[3]Lee Narn-Yih,Lee Ming-Feng.The security of a strong proxy signature scheme with proxy signer privacy protection[J].Applied Mathematics and Computation,2005,161:807-812 被引量:1
  • 5MAMBO M, USUDA K, OKAMOTO E. Proxy signature: delegation of the power to sign messages[J]. IEICE Trans Fundamentals, 1996,79(9): 1338-1354. 被引量:1
  • 6MAMBO M, USUDA K, OKAMOTO E. Proxy signature for delegating signing operation[A]. Proc 3rd ACM Conference on Computer and Communications Security[C]. New Delhi: ACM Press,1996. 48-49. 被引量:1
  • 7YI L J, BAI G Q, XIAO G Z. Proxy multi-signature scheme: a new type of proxy signature scheme[J]. Electronics Letters, 2000, 36(6):527-528. 被引量:1
  • 8ZHANG K. Non-repudiable proxy signature schemes[EB/OL], http://citeseer.nj.nec.com/360090, html, 1999. 被引量:1
  • 9ZHANG K. Threshold proxy signature schemes[A]. 1997 Information Security Workshop[C]. Japan, Springer-Verlag, 1997. 191-197. 被引量:1
  • 10KIM S, PARK S, WON D. Proxy signature, revisited[A]. Proceedings ICICS'97, Lecture Notes in Computer Science 1334[C]. Berlin:Springer-Verlag, 1997. 223-232. 被引量:1

共引文献43

同被引文献15

  • 1宋夏,戚文峰.基于双线性映射的可撤销代理权的代理签名[J].信息工程大学学报,2006,7(4):330-332. 被引量:2
  • 2茹鹏,彭代渊.基于强Key-insulated的多级代理签名体制[J].信息安全与通信保密,2007,29(8):70-72. 被引量:3
  • 3Mambo M,Usuda K,Okamoto E.Proxysignature:Delegation of the Power to Sign Messages[J].IEICE Trans on Fundamentals of Electronics Communications and Computer Sciences,1996,E79-A(09):1338-1354. 被引量:1
  • 4Shamir A.Identity-ased Cryptosystems and Signature Schemes[C] //Blakley G R,Chaum D,eds.Advances in Cyptology,Crypto 84.Berlin:Springer-Verlag,1984:47-53. 被引量:1
  • 5Boneh D,Franklin M.Identity-based Encryption from the Weil Pairing[C] //Kilian J ed.Advances in Cryptology-CRYPTO 2001,Lecture Notes in Computer Science 2139.Berlin:Springer-Vedag,2001:213-229. 被引量:1
  • 6Paterson K G.ID-based Signatures from Pairings on Elliptic Curves[J].Electronics Letters,2002,38(18):1025-1026. 被引量:1
  • 7Cao T,Lin D,Xue R.ID-based Designated Verifier Proxy Sigtures[J].Communications,IEE Proceedings,2005,152(06):989-994. 被引量:1
  • 8孙慧慧,陈少真.具有可撤销性的群签名体制的一般化实现[C] //密码学进展-CHINACRYPT'2006第九届中国密码学学术会议论文集.北京:中国科学技术出版社,2006:81-87. 被引量:1
  • 9MAMBO M, USUDA K, OKAMOTO E. Proxy Signature: Delegation of the Power to Sign Messages[J]. IEICE Trans. Fundamentals, 1996(E79-A):1338- 1353. 被引量:1
  • 10GOYAL V, PANDEYY O, SAHAIZ A. Attribute-based Encryption for Fine-grained Access Control of Encrypted Data[C]. USA: ACM Press, 2006:89-98. 被引量:1

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部