期刊文献+

一种安全的椭圆曲线代理签名方案 被引量:5

A Secure Proxy Signature Scheme Based on the Elliptic Curve
在线阅读 下载PDF
导出
摘要 将代理签名的思想应用到椭圆曲线密码体制中,提出了一种基于椭圆曲线离散对数问题的安全代理签名方案,该方案解决了已有的几种典型的基于椭圆曲线离散对数问题的代理签名方案中存在的安全缺陷问题.安全性分析表明,该方案是安全的,不仅满足代理签名所具有的基本性质,还具有更好的安全性和实用性. In this paper, a secure proxy signature scheme based on the elliptic curve was proposed by applying the idea of proxy digital signature scheme to elliptic curve cryptosystem, and the scheme improved the security of the several existing typical proxy signature schemes. The security analysis showed that the scheme not only has fundamental properties needed by proxy signature scheme, but also has higher security and practicability.
出处 《佳木斯大学学报(自然科学版)》 CAS 2007年第4期495-497,共3页 Journal of Jiamusi University:Natural Science Edition
基金 甘肃省自然科学基金项目(3ZS051-A25-042)
关键词 代理签名 椭圆曲线 数字签名 proxy signature elliptic curve digital signature
作者简介 左为平(1976-),男,甘肃甘谷人,讲师,硕士研究生主要从事信息安全,现代密码学研究.
  • 相关文献

参考文献8

二级参考文献17

  • 1祁明,肖国镇.加强广义El Gamal型签名方案的安全性[J].电子学报,1996,24(11):68-72. 被引量:10
  • 2[1]S Kim, S Park, D Won. Pxoxy signatures, revisited. In: Proc of ICICS'97, Int'l Conf on Information and Communications Security. Berlin: Springer-Verlag, 1997. 223~232
  • 3[2]M Mambo, K Usuda, E Okamoto. Proxy signature: Delegation of the power to sign messages. IEICE Trans on Fundamentals of Electronics Communications and Computer Sciences, 1996, E79-A(9): 1338~1354
  • 4[3]M Mambo, K Usuda, E Okamoto. Proxy signatures for delegation signing operation. In: Proc of the 3rd ACM Conf on Computer and Communications Security. New York: ACM Press, 1996. 48~57
  • 5[4]B Lee, H Kim, K Kim. Strong proxy signature and its applications. The 2001 IEICE Symp on Cryptography and Information Security, Oiso, Japan, 2001
  • 6[5]K Ohta, T Okamoto. A digital multisignature scheme based on the Fiat-Shamir scheme. In: Advances in Cryptology-ASIACrypt'91. Berlin: Springer-Verlag, 1991. 139~148
  • 7[6]L Yi, G Bai, G Xiao. Proxy multi-signature scheme: A new type of proxy signature scheme. Eletronic Letters, 2000, 36(6): 527~528
  • 8[7]D Johnson, A Menezes, S Vanstone. The elliptic curve digital signature algorithm(ECDSA). 1999. http://www.certicom.com/pdfs/whitepapers/ecdsa.pdf
  • 9[8]D Brown. The exact security of ECDSA. Center for Applied Cryptographic Research, the University of Waterloo, Tech Rep: CORR 2000-54, 2000. http://www.cacr.math.uwaterloo.ca/
  • 10KOBLITZ N. Elliptic curve cryptosystems[J]. Mathematics of Computation, 1987, 48: 203-209.

共引文献88

同被引文献30

引证文献5

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部