期刊文献+

基于双线性对的前向安全代理签名方案

Forward Secure Proxy Signature Scheme based on Bilinear Pairings
下载PDF
导出
摘要 将前向安全的概念结合到代理签名体制中,利用椭圆曲线上的双线性对构造了一个基于双线性对的前向安全代理签名方案。此方案保护了原始签名者和代理签名者权益,攻击者即使在本时段入侵,也无法伪造过去时段的签名,有较高的效率和较强的安全性。 Combining the concept of forward security, an efficient proxy signature scheme based on bilinear pairings of elliptic curve is proposed. The signature scheme provides the safeguard to the rights and interests of both the original and the proxy signers. Even if an adversary can intrude and obtain the signature key at this time period, it could not forge the proxy signature of the past time. The scheme has high efficiency and strong security.
出处 《微计算机应用》 2008年第7期16-20,共5页 Microcomputer Applications
基金 北京市教改立项网络对抗实验平台
关键词 双线性对 前向安全 代理签名 bilinear pairings, forward security, proxy signature
  • 相关文献

参考文献11

  • 1Mambo M, Usuda K, Okamoto E. Proxy Signature: Delegation of the Power to Sign Messages. IEICE Trans Fundaments, 1996,79 (9) :1338 - 1353.
  • 2Ross Anderson. Two remarks on public key cryptology. Invited Lecture. The fourth ACM Computer and Communication Security, 1997.
  • 3A Fiat, A Shamir. How to prove yourself: practical solutions to identification and signature problems. Advances in Cryptology - Crypto86, Lecture Notes of Computer Science, 1986,1987 : 186 - 194.
  • 4M Bellare, S K Miner. A forward -secure digital signature scheme. Advances in Cryptology -Crypto99, Lecture Notes of Computer Science, 1999,1666 : 431 - 448.
  • 5Mihir Bellare, Sara Miner. A Forward- Secure Digital Signature Scheme. Cryptology- CRYPTO99. 1999:431 -448.
  • 6AMos Fiat, Adi Shamir. How to prove Yourself: Practical Solutions to Identification and Signature Prohlems. Cryptology -CRYPT056. 1987 : 186 - 194.
  • 7Michel Abdalla, Leonid Reyzin. A Forward- Secure Digital Signature Scheme. Cryptology- ASIACRYTP00. 2000.
  • 8Silvio Micali. A Secure and Efficient Digital Signature Algorithm. Massachusetts Institute of Technology, 1994.
  • 9王晓明,陈火炎,符方伟.前向安全的代理签名方案[J].通信学报,2005,26(11):38-42. 被引量:35
  • 10F Zhang, R Safavi -Naini, C Lin. New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairings. Cryptology ePrint Archive. 2003.

二级参考文献16

  • 1[1]V.Miller,Use of elliptic curves in Cryptography[C].Proc.of Crypto' 85,LNCS 128,Springer-Verlag,1986,417-426.
  • 2[2]D.Boneh and M.Franklin.Identity-based encryption from the Weil pairing[C].Advances in Cryptology-Crypto 2001,LNCS 2139,Springer-Verlag,2001,213-229.
  • 3[3]J.C.Cha and J.H.Cheon.An identity-based signature from gap Diffie-Hellman groups[C].Public Key Cryptography-PKC 2003,LNCS 2139,Springer-Verlag,2003,18-30.
  • 4[4]L.Chen and C.Kudla.Identity based authenticated key agreement from pairings.Cryptology eprint archive,Report 2002/184,2002.http://eprint.iacr.org/2002/184.
  • 5[5]Mambo,M.,Usuda,K.,Okamoto,E.,1996.Proxy signatures for delegating signing operation,Proceedings of the 3rd ACM Conference on Computer and Communications Security(CCS),ACM,48-57.
  • 6[6]Lee,B.,Kim,H.,Kim,K.,2001.Strong proxy signature and its applications,Proceedings of SCIS,Japan,vol 2/2,603-608.
  • 7[7]K.Zhang.Threshold proxy signature schemes[C].In:Information Security(ISW' 97),LNCS 1396,282-290.Berlin:Springer-Verlag,1997.
  • 8[8]B.Lee,H.Kim,and K.Kim.Strong proxy signature and its applications[C].In:Proc.of the 2001 Symposium on Cryptography and Information Security (SCIS' 01),vol 2/2,pp:603-608.Oiso,Japan,Jan.23-26,2001.
  • 9MAMBO M, USUDA K, OKAMOTO E. Proxy signature: delegation of the power to sign messages[J]. IEICE Trans Fundamentals, 1996,79(9): 1338-1354.
  • 10MAMBO M, USUDA K, OKAMOTO E. Proxy signature for delegating signing operation[A]. Proc 3rd ACM Conference on Computer and Communications Security[C]. New Delhi: ACM Press,1996. 48-49.

共引文献34

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部