期刊文献+

基于代理签名体制的几种特殊的数字签名 被引量:1

THE SEVERAL SPECIAL DIGITAL SIGNATURES ON THE PROXY SIGNATURE SCHEME
下载PDF
导出
摘要 随着计算机网络和信息技术的快速发展,数字签名技术也正被人们应用于信息安全中,而具有特殊用途的代理签名已在电子商务、电子选举以及网络安全传输等方面有着广泛的使用,本文主要讨论代理多重签名、盲代理签名以及多级代理签名这三种具有特殊用途的代理签名机制。 With the rapid development of computer network and information technology, the digital signature technology is widely applied to the safe information .And the proxy signature having special uses has widely applied to the electronic commerce, electronic voting and safe network transmission and so on .Here is to discuss three special uses proxy signature Scheme, which are the proxy multi-signature, blind proxy signature and multiple grade proxy signature.
作者 陈开兵
出处 《巢湖学院学报》 2006年第3期38-41,共4页 Journal of Chaohu University
关键词 代理签名 代理多重签名 盲代理签名 多级代理签名 Proxy Signature Proxy Multi-Signature Blind Proxy Signature Multiple Grade ProxySignature
  • 相关文献

参考文献1

二级参考文献8

  • 1Mambo M, et al. Proxy signatures: Delegation of the Power to sign Messages[ J ]. IEICE Trans on Fundamentals, 1996, E79-A(9) : 1338-1354.
  • 2Mambo M,et al. Proxy Signatures[ C]. Proceeding of the 1995 Symposium on Cryptography and Information Security( SCIS 95), Inuyama, Japan, 1995, B1.1-17.
  • 3Kim S,Park S, Won D. Proxy Signatures, Revisited[ C ]. Proc of Int' 1 Conf on Information and Communications Security, LNCS1334, Springer-Verlag, 1997.223-232.
  • 4Ohta K, Okamoto T. A Digital Multi-signature Scheme Based on the Fiat-Shamir Scheme [ C ]. Advances in Crytology-ASIACYPT'91, Springer-Verlag, 1991. 139-148.
  • 5Chaum D. Blind Signatures Systems; Advances in Cryptology-CRYPT' 83[ C]. Plenum Press, New York, 1983. 153.
  • 6Camenisch J, et al. Blind Signatures Based on the Discrete Logarithm Problem [ C ]. Advances in Cryptology-EUROCRYPT'94, Lecture Notes in Computer Science v. 950, Spring-Verlag,1995.428-432.
  • 7祁明,史国庆.强盲签名技术的研究与应用[J].计算机应用研究,2001,18(3):34-37. 被引量:12
  • 8祁明,许柏桐.代理签名技术的研究与发展[J].计算机应用研究,2001,18(9):29-32. 被引量:15

共引文献4

同被引文献6

  • 1Mambo M, Usuda K, Okamoto E. Proxy Signatures for Delegating Signing Operation[C]//Proceedings of the 3rd ACM Conference on Computer and Communications Security. New York, USA: ACM Press. 1996: 48-57.
  • 2Lu E J L, Hwang M S, Huaug C J. A New Proxy Signature Scheme with Revocation[J]. Applied Mathematics and Computation, 2005, 161(3): 799-806.
  • 3Pointcheval D, Stern J. Security Proofs for Signatures Schemes[M]. Berlin, Germany: Springer-Verlag, 1996.
  • 4Girault M. Self-certified Public Keys[C]//Proceedings of Eurocrypt'91. Berlin, Germany: Springer-Verlag, 1991: 491-497.
  • 5王天银,刘麦学,温巧燕.三种盲代理多重签名方案的密码分析[J].电子与信息学报,2009,31(2):493-496. 被引量:3
  • 6曹锋.改进代理多重签名方案的安全性分析[J].计算机工程,2010,36(17):155-157. 被引量:1

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部