期刊文献+

可追踪的无证书多级代理签名方案

Traceable multi-level proxy signature scheme in certificateless cryptography
下载PDF
导出
摘要 利用双线性映射设计出一个有效的无证书多级代理签名方案。在最强的安全模型下,方案给出了正式的安全证明。它的安全性基于计算Diffie-Hellman问题的困难性。所提出的方案满足诸如可验证性、不可否认性、可识别性、防止签名滥用等安全性质。该多级代理签名方案具有前向可追踪性和后向扩展的灵活性。鉴于方案的安全、高效和灵活的优点,它可广泛应用于电子商务、移动代理系统等方面。 This paper proposed a construction of traceable multi-level proxy signature scheme in certificateless setting using bilinear maps.The security of proposed scheme was based on the infeasibility of the computational Diffie-Hellman problem and proved formally in the strongest security model of certificateless proxy signature schemes.The scheme satisfied the security requirements such as verifiability,undeniability,identifiability and prevention of misuse for a proxy signature scheme.This multi-level proxy signature scheme possessed the forward traceability and the flexibility of backward expansion.Due to its security,high efficiency and flexibility,it could practically applicate in electronic commerce and mobile agent systems,etc.
出处 《计算机应用研究》 CSCD 北大核心 2013年第6期1835-1839,共5页 Application Research of Computers
基金 国家自然科学基金资助项目(60673070) 安徽省自然科学基金资助项目(1208085MF108 1208085QF119) 安徽省高校自然科学基金资助项目(KJ2012B157)
关键词 无证书密码系统 代理签名 多级代理签名 不可伪造性 certificateless cryptography system proxy signature multi-level proxy signature unforgeable
  • 相关文献

参考文献10

二级参考文献96

  • 1CAO Chunjie,MA Jianfeng,MOON Sangjae.Provable Efficient Certificateless Group Key Exchange Protocol[J].Wuhan University Journal of Natural Sciences,2007,12(1):41-45. 被引量:8
  • 2Mambo M, Usuda K, Okamoto E. Proxy signature: Delegation of the power to sign messages. IEICE Trans. on Fundamentals, 1996, E79-A(9): 1338-1353. 被引量:1
  • 3Zhang k Threshold proxy signature schemes. In: Proc. of the 1997 Information Security Workshop. Japan, 1997. 191-197. 被引量:1
  • 4Yi LJ, Bai GQ, Xiao GZ. Proxy multi-signature scheme: A new type of proxy signature scheme. Electronics Letters, 2000,36(6): 527-528. 被引量:1
  • 5Huang XY, Mu Y, Susilo W, Zhang FT. Short designated verifier proxy signature from pairings. In: Proc. of the SecUbiq 2005. LNCS3823, Nagasaki, Springer-Verlag, 2005. 835-844. 被引量:1
  • 6Zhang FG, Kim-K. Efficient 1D-based-blind signature and proxy signature from bilinear pairings. In: Safavi-Naini R, Seberry J, eds. Proc. of the ACISP 2003. LNCS 2727, Springer-Verlag, 2003. 312-323. 被引量:1
  • 7Al-Riyami S, Paterson K. Certificateless public key cryptography. In: Prec. of the Asiacrypt 2003. LNCS 2894, Springer-Verlag, 2003. 452-473. 被引量:1
  • 8Huang XY, Mu Y, Susilo W, Wong DS, Wu W. Certificateless signature revisited. In: Proc. of the Acisp 2007. LNCS 4586, Springer-Verlag, 2007. 308-322. 被引量:1
  • 9Zhang ZF, Wong DS, Xu J, Feng DG. Certificateless public-key signature: Security model and efficient construction. In: Zhou J, Yung M, Bao F, eds. Proc. of the ACNS 2006. LNCS 3989, Springer-Verlag, 2006. 293-308. 被引量:1
  • 10Li X, Chen K, Sun L. Certificateless signature and proxy signature schemes from bilinear pairings. Lithuanian Mathematical Journal, 2005,45(1 ):76-83. 被引量:1

共引文献90

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部