期刊文献+

一个前向安全的强代理签名方案 被引量:18

A Forward Secure Strong Proxy Signature
下载PDF
导出
摘要 基于代理签名理论和前向安全签名理论,提出了一个前向安全的强代理签名方案,其安全性建立在求离散对数和模合数求平方根是困难的这两个假设的基础上。此方案同时对代理签名人和原始签名人的权益提供了保护,攻击者即使在第i时段入侵系统,也无法伪造第i时段之前的签名,因而具有较高执行效率和较强的安全性。 A forward secure strong proxy signature scheme is proposed on the basis of the proxy signature schemes and forward secure schemes.The security of the proposed scheme relies on the difficulty of solving discrete logarithm problems and the difficulty of computing square roots modulo a large composite number.The signature scheme provides the safeguard to the rights and interests of both the original and the proxy signers.Even if an adversary can intrude the system and obtain the signature key at time period i, it could not forge the proxy signature before time period i.
出处 《信息与电子工程》 2003年第4期257-259,共3页 information and electronic engineering
基金 National Grand Fundamental Research 973 Program of China(1998030600)
关键词 公钥密码学 数字签名 前向安全 离散对数 模合数求平方根 代理签名 public key cryptology digital signature forward security discrete logarithm square root modulo composites
  • 相关文献

参考文献11

  • 1[1]Ross Anderson.Two remarks on public key cryptology. Invited Lecture [A].The fourth ACM Computer and Communication Security [C],1997. 被引量:1
  • 2[2]A Fiat,A Shamir.How to prove yourself:practical solutions to identification and signature problems [A].Advances in Cryptology-Crypto'86, Lecture Notes of Computer Science [C],1986,1987: 186-194. 被引量:1
  • 3[3]M Bellare,S K Miner. A forward-secure digital signature scheme [A]. Advances in Cryptology-Crypto'99, Lecture Notes of Computer Science [C],1999, 1666: 431-448. 被引量:1
  • 4[4]M Abdalla,L Reyzin. A new forward-secure digital signature scheme [A]. Asiacrypt'00, Lecture Notes of Computer Science [C], 2000,1976:116-129. 被引量:1
  • 5[5]L C Guillou, J J Quisquater. A "paradoxical" identity-based signature scheme resulting from zero-knowledge [A]. Advances in Cryptology-Crypto'88, Lecture Notes of Computer Science [C],1988, 403: 216-231. 被引量:1
  • 6[6]G Itkis,L Reyzin. Forward-secure signatures with optimal signing and verifying [A]. Advances in Cryptology-Crypto'01, Lecture Notes of Computer Science [C],2001, 2139:332-354. 被引量:1
  • 7[7]M Mambo,K Usuda,E Okamato. Proxy signature: Delegation of the power to sign messages [A]. IEICE Trans. Fundamentals [C],1996, E79-A: 1338-1353. 被引量:1
  • 8[8]Zuhua Shao. Proxy signature schemes based on factoring [A]. Information Processing Letter [J], 2003, 85: 137-143. 被引量:1
  • 9[9]B Lee, H Kim, K Kim. Strong proxy signature and its applications [A]. SCI2001 [C],2001, 2: 603-608. 被引量:1
  • 10[10]J Y Lee, J H Cheon, S Kim. An analysis of proxy signatures: Is a secure channel necessary? [A]. CT-RST 2003 [C],2003, 2612: 68-79. 被引量:1

同被引文献130

引证文献18

二级引证文献63

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部