期刊文献+

不可否认的可公开验证的代理多重签密方案

Nonrepudiable Proxy Multi-Signcryption Scheme with Public Verifiability
下载PDF
导出
摘要 针对现有的代理签名仅能提供授权的认证而不能提供保密性的弱点,提出了一种有效的代理多重签密方案。该方案具有如下特点:原始签名人与代理签密人之间不必使用安全信道;只有指定的接收者能验证代理签密的有效性;当代理签名人否认签密时,接收者可单独将代理签密转换为一般的代理签名。 Most previous proxy signatures only provide the delegated authenticity and don't provide the confidentiality. An efficient proxy multi-signcryption scheme is presented. The proposed scheme has the following properties: Original signer and proxy signer don't use secure channel; Only the specified recipient can check the validity of the proxy signcryption; When the proxy signer repudiates the signcryption, the recipient can convert this proxy signcryption into an ordinary proxy signature alone.
出处 《计算机工程》 CAS CSCD 北大核心 2007年第2期130-132,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60173041) 广东海洋大学自然科学基金资助项目
关键词 密码学 代理签密 不可否认性 公开验证 Cryptography Proxy signcryption Nonrepudiable Public verifiability
  • 相关文献

参考文献12

  • 1Mambo M,Usuda K,Okamoto E.Proxy Signatures:Delegation of the Power to Sign Messages[J].IEICE Trans.on Fundamentals,1996,E79-A(9):1338-1354.
  • 2Mambo M,Usuda K,Okamoto E.Proxy Signatures for Delegating Signing Operation[C].Proc.of the 3^rd ACM Conference on Computer and Communications Security,1996:48-57.
  • 3Kim S,Park S,Won D.Proxy Signatures,Revisited[C].Proc.of Int.Conf.on Information and Communications Security,1997:223-232.
  • 4甘元驹,施荣华.一种安全的有效代理签名方案[J].云南大学学报(自然科学版),2004,26(1):35-37. 被引量:3
  • 5Sun H M,Hsieh B T.Remarks on Two Nonrepudiable Proxy Signature Schemes[C].Proceedings of the 9^th National Conference on Information Security,1999:241-246.
  • 6Hsu C L,Wu T S,Wu T C.New Nonrepudiable Threshold Proxy Signature Scheme with Known Signers[J].The Journal of Systems and Software,2001,58(2):119-124.
  • 7Yang C Y,Tzeng S F,Hwang M S.On the Efficiency of Nonrepudiable Threshold Proxy Signature Scheme with Known Signers[J].The Journal of Systems and Software,2004,73(3):507-605.
  • 8Zheng Y.Signcryption and Its Applications in Efficient Public Key Solutions[C].Proceedings of Information Security Workshop,1997:291-312.
  • 9Chan W K,Wei V K.A Threshold Proxy Signcryption[C].Proc.of International Conference on Security and Management,Monte Carlo Resort,Las Vegas,Nevada,USA,2002:24-27.
  • 10甘元驹,黎群辉,施荣华.一种可追踪接收者的时控代理签名方案[J].计算机工程与应用,2004,40(10):140-141. 被引量:4

二级参考文献19

  • 1NYBERG K, RUEPPEL R A. A new signature scheme based on the DSA giving message recovery[A]. Proceeding of the First ACM Conf on Computer and Communications Security[C]. Fairfax: VA,1993.
  • 2HORSTER P, MICHELS M, PETERSEN H. Authenticated encryption schemes with low communication costs[J]. Electronics Letters,1994,30(15):1212-1213.
  • 3LEE W B, CHANG C C, YANG W P. Authenticated encryption schemes without using a one way function[J]. Electronics Letters,1995,31(19):1656-1657.
  • 4CHEN K. Authenticated encryption schemes based on Qudratic residue [J]. Electronics Letters, 1998, 34(22):2115-2116.
  • 5MA C S, CHEN K F. Publicly verifiable authenticated encryption [J]. Electronics Letters, 2003,39 (3):281-282.
  • 6TSENG Y M, JAN J M. An efficient authenticated encryption scheme with message linkages and low communication costs[J]. J of Information Science and Engineering, 2002,18 ( 1 ): 41 - 46.
  • 7TSENG Y M, JAN J M. Digital signature with message recovery using self-certified public keys and its variants[J]. Applied Mathematics and Computation,2003,136(2) :203-214.
  • 8LEE W B, CHANG C C. Authenticated encryption schemes with linkage between message blocks[J]. Inform Pross Lett,1997,63(5):247-250.
  • 9ARAKI S, UEHARA S, IMAMURA K. The limited verifier signature and its application[J]. ICICE Transactions on Fundamentals, 1999,E82-A (1): 63- 68.
  • 10WU T S, HSU C L. Convertible authenticated encryption scheme[J]. J of System and Software,2002,62(6) :205-209.

共引文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部