期刊文献+

一个高效安全的代理签名方案

An efficient and secure proxy signature scheme
下载PDF
导出
摘要 代理签名是指签名授权人委托某人代理其签名,它在电子商务领域里有着广泛应用。目前已知的可证明安全的代理签名还很少。利用椭圆曲线上的双线性对,构造了一个新的代理签名方案,该方案在随机预言模型下是可证明安全的,而且其效率也优于已有文献。 In a proxy signature scheme, the entity can delegate signing capabilities to other participants so that they can sign on behalf of the entity.Proxy signature scheme is used in applications such as electronic business.There are few provable secure proxy signature schemes.In this paper, a new provably secure proxy signature scheme based on bilinear pairings is proposed,which is more efficient than that of the existing ones.
作者 林群 李进
出处 《计算机工程与应用》 CSCD 北大核心 2010年第31期115-117,168,共4页 Computer Engineering and Applications
基金 韩山师范学院2007年青年科学基金项目(2007-18)
关键词 代理签名 双线性对 随机预言模型 可证明安全 proxy signature bilinear pairings random oracle model provable security
  • 相关文献

参考文献7

  • 1Mambo M, Usuda K, Okamoto E.Proxy signatures for delegating signing operation[C]//Proceedings of the 3rd ACM Conference on Computer and Communications Security(CCS), 1996: 48-57.
  • 2Lee B,Kim H,Kim K.Strong proxy signature and its applications[C]//Proceedings of SCIS, Japan, 2001,2/2: 603-608.
  • 3居上游,戎丹.基于双线性对的代理签名的研究与应用[J].计算机工程与应用,2008,44(29):128-130. 被引量:2
  • 4Wang G,Bao F,Zhou J,et al.Security analysis of some proxy signatures[C]//ICISC 2003.Springer-Verlag,2004,2971:305-319.
  • 5Boldyreva A, Palacio A, Warinsehi B.Secure proxy signature Schemes for delegation of signing rights Report 2003/096[R/OL]. http://eprint.iacr.org.
  • 6李进,王燕鸣.一个可证明安全的代理签名方案[J].计算机工程,2006,32(20):13-15. 被引量:2
  • 7Zhang F, Safavi-Naini R, Susilo W, An efficient signature scheme from bilinear pairings and its applications[C]//PKC 2004, Singapore.Springer-Verlag, 2004.

二级参考文献18

  • 1Boneh D,Franklin M.ldentity-based encryption from the weil pairing[J].SIAM J of Computing, 2003,32(2) : 586-615.
  • 2Barreto P S L M,Kim H Y,Scott M.Efficient algorithms for pairing based cryptosystems[C]//LNCS:Proceedings of Crypto 2002.[S.l.]: Springer-Verlag, 2002,2442 : 354-368.
  • 3Galbraith S,Harrison K,Soldera D.Implementing the tate pairing [C]//LNCS:Proceedings of Algorithm Number Theory Symposium ANTS V.[S.l.]: Springer-Verlag, 2002,2369 : 324-337.
  • 4Zhang F G,Safavi-Naini R,Lin C Y.New proxy signature,proxy blind signature and proxy ring signature schemes from bilinear pairings,Report 2003/117[R/OL].Cryptology ePrint Arehive.http:// eprint.iaer.org/2003/104.
  • 5Mambo M,Usuda K,Okamoto E.Proxy signature for delegating signing operation[C]//Proc 3rd ACM Conference on Computer and Communication Security.[S.l]: ACM Press, 1996:48-57.
  • 6Zhang K.Threshold proxy signature schemes [C]//1997 Information Security Workshop, 1997: 191-197.
  • 7Sun H M,Lee N Y,Hwang T.Threshold proxy signatures[J].IEE Proc Computers & Digital Techniques, 1999,146(5) :259-263.
  • 8Kim S,Park S,Won D.Proxy signatures,revisited[C]//LNCS:Int Conf on Information and Communication Security.Springer-Verlag,1997, 1334 : 223-232.
  • 9Sun H M.An efficient nonrepudiable threshold proxy signature scheme with known signers[J].Computer Communications, 1999,22 (8):717-722.
  • 10Hwang M S,Lin I C,Lu E J.A secure nonrepudiable threshold proxy signature scheme with known signers[J].International Journal of Informatica, 2000,11 ( 2 ) : 1-8.

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部