期刊文献+

一种多级门限代理签名方案

Research on a Multi-level Threshold Proxy Signature Scheme
下载PDF
导出
摘要 已有的(t,n)门限代理签名方案,只能实现在同一级门限下的代理签名。本文利用离散对数和大数分解问题的困难性,提出一种多级门限代理签名方案。该方案能在各代理签名人持有密钥不变的情况下,根据待签名文件的安全性要求,调整门限值,实现在多级门限下的代理签名。该方案具有安全性高,灵活性强的特点。 In a threshold proxy signature scheme, the proxy signature can only be generated in the same level threshold. A multi--level threshold proxy signature scheme based on the intractability of the discrete logarithm and integer factorization is proposed. In the scheme, each proxy signer keeps only one proxy key, the proxy signatures are generated in the multiple level thresholds according to the security level of the message. The scheme has advantage of higher secure reliability and flexibility.
作者 王建东 宋超
出处 《北京电子科技学院学报》 2011年第4期42-45,共4页 Journal of Beijing Electronic Science And Technology Institute
关键词 门限代理签名 多级门限 代理签名 合谋攻击 threshold proxy signature multi-- level threshold proxy signature conspiracy attack
  • 相关文献

参考文献7

二级参考文献21

  • 1王晓明,张震,符方伟.一个安全的门限代理签名方案[J].电子与信息学报,2006,28(7):1308-1311. 被引量:7
  • 2Mambo M, Usuda K, Okamoto E. Proxy Signature: Delegation of the Power to Sign Messages[J]. IEICE Trans. on Fundamental, 1996, E79-A(9): 1338-1353. 被引量:1
  • 3Kim S, Park S, Won D. Proxy Signature, Revisited[C]//Proc. of International Conference on Information and Communication Security. [S. l.]: Springer-Verlag, 1997: 223-232. 被引量:1
  • 4Sun Hung-Min. An Efficient Nonrepudiable Threshold Proxy Signature Scheme with Known Signers[J]. Computer Communication, 1997, 22(8): 717-722. 被引量:1
  • 5Sun Hung-Min. Threshold Proxy Signatures[J]. IEEE Proceedings of Computers and Digital Techniques, 1999, 146(5): 259-263. 被引量:1
  • 6Hsu C L, Wu T S, Wu T C. New Nonrepudiable Threshold Proxy Signature Scheme with Known Signers[J]. Journal of Systems and Software, 2001, 58(9): 119-124. 被引量:1
  • 7Hwang Min-Shiang, Lu Eric Jui-Lin, Hwang luon-Chang. A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem[J]. Knowledge and Data Engineering, 2003, 15(6): 1552-1560. 被引量:1
  • 8Shamir A.How to share a secret[J].Communications of the ACM,1979,22(11):612-613. 被引量:1
  • 9Blakley G R.Safeguarding cryptographic keys[C]∥ Proceedings of National Computer Conference.Montvale,NJ:AFIPS Press,1979,48:313-317. 被引量:1
  • 10Ito M,Saito A,Nishizeki T.Secret sharing scheme realizing general access structure[C]∥ Proceedings IEEE Globecom'87.Tokyo,Japan:IEEE Press,1987.99-102. 被引量:1

共引文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部