期刊文献+

不需要可信任方的匿名代理签名方案 被引量:2

Anonymous Proxy Signature Scheme Without Trusted Party
在线阅读 下载PDF
导出
摘要 匿名代理签名是特殊的代理签名,设计不需要可信任方参与的匿名代理签名方案是代理签名的一个重要研究方向。该文分析了两个该类方案的安全性,在此基础上给出了一个新的不需要可信任方的匿名代理签名方案。该方案具有强不可伪造性,且签名结果不含冗余数据。并以新方案为基础设计了两个匿名代理多重签名方案。 Anonymous proxy signature is one of the special proxy signatures. It is one of the important researches on the proxy signature that designs an anonymous proxy signature scheme without a trusted party. This paper analyzes the security of two schemes. Then a new anonymous proxy signature scheme without a trusted party is presented, which can keep the property of the strong unforgeability and does not have the redundant data in signature. In the end, two anonymous proxy multi-signature schemes based on the new scheme are designed.
作者 陈凯 鲍皖苏
出处 《计算机工程》 CAS CSCD 北大核心 2008年第2期138-140,153,共4页 Computer Engineering
基金 国家自然科学基金资助项目(10501053)
关键词 代理签名 代理多重签名 匿名性 强不可伪造性 冗余数据 proxy signature proxy multi-signature anonymity strong unforgeability redundant data
作者简介 陈凯(1981-),男,硕士,主研方向:数字签名理论;E-mail:kellermanchen@163.com. 鲍皖苏,教授
  • 相关文献

参考文献7

二级参考文献19

  • 1谷利泽,李中献,杨义先.不需要可信任方的匿名代理签名方案[J].北京邮电大学学报,2005,28(1):48-50. 被引量:24
  • 2[1]Mambo M,Usuda K,Okamoto E.Proxy signature Delegation of the power to sign messages[A].IEICE Trans on Fundamentals[C].1996,E79-A(9):1338-1354
  • 3[2]Shum K,Wei V K.A strong proxy signature scheme with proxy signer privacy protection[A].Proceedings of the Eleventh IEEE International Workshops on Enabling Technologies:Infrastructure for Collaborative Enterprises (WETICE' 02),Pittsburgh,Pennsylvania,USA,2002:55-56
  • 4[3]Lee Narn-Yih,Lee Ming-Feng.The security of a strong proxy signature scheme with proxy signer privacy protection[J].Applied Mathematics and Computation,2005,161:807-812
  • 5Mambo M, Usuda K, Okamoto E. Proxy signature:delegation of the power to sign messages[A]. EICE Trans Fundamentals[C]. 1996. 1338-1353.
  • 6Lee B, Kim H, Kim K. Strong proxy signature and it's applications [A]. International Conference on Information and Communication Security, Proc of SCIS[C]. Japan, 2001. 603-608.
  • 7Kim S, Park S, Won D. Proxy signature, revisited[A]. International Conference on Information and Communication Security, Proc of ICICS[C]. Berlin,1997. 223-232.
  • 8Lee B, Kim H, Kim K. Secure mobile agent using strong non-designated proxy signature FA 1. Proc ACISP[C]. Spring-Verlag, 2001. LNCS 1 334, 474-486.
  • 9Shum K, Wei Victor K. A strong proxy signature scheme with proxy signer privacy protection [EB/OL]. http: // www. computer. org/proceedings/wetice/1748/17480055. pdf, 2002.
  • 10Boyd C. Comment :new digital signature scheme based discrete logarithm[J]. Electronics Letters, 1994, 30(6) : 480-481.

共引文献51

同被引文献7

  • 1谷利泽,李中献,杨义先.不需要可信任方的匿名代理签名方案[J].北京邮电大学学报,2005,28(1):48-50. 被引量:24
  • 2柳菊霞,吴良杰,苏靖枫,付蓉.匿名代理签名方案的研究与改进[J].信息安全与通信保密,2006,28(3):75-77. 被引量:8
  • 3Mambo M,Usuda K,Okamoto E.Proxy Signature:Delegation of the Power to Sign Messages[J].IEICE Trans.on Fundamental,1996,79(9):1338-1353.
  • 4Lee B,Kim H,Kim K.Strong Proxy Signature and Its Applications[C]//Proc,of the Symposium on Cryptography and Information Security.[S.l.]:IEEE Press,2001.
  • 5Shum K,Wei V K.A Strong Proxy Signature Scheme with Proxy Signer Privacy Protection[C]//Proc.of the 11th International Workshop on Enabling Technologies:Infrastructure for Collaborative Enterprises,Pittsburgh,Pennsylvania,USA:[s.n.],2002.
  • 6Lee Narn-Yih,Lee Ming-Feng.The Security of a Strong Proxy Signature Scheme with Proxy Signer Privacy Protection[J].Applied Mathematics and Computation,2005,161(3):807-812.
  • 7王志坚,蔡自兴.一种制造系统模型及其简化[J].微计算机信息,2007(03S):139-140. 被引量:4

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部