期刊文献+

代理盲签名方案在基于移动代理的电子商务中的应用研究 被引量:3

A Study on the Application of Proxy Blind Signature in Electronic Commerce Based on Mobile Agent Technology
在线阅读 下载PDF
导出
摘要 探讨了一种代理盲签名方案在基于移动代理技术的电子商务中的应用。该方案的应用既能增加Internet上各移动代理的可信度,又能保证其所从事交易内容的私密性。同时,也提供了对存在非法行为或者恶意攻击行为的移动代理的身份追踪和审计功能。 The paper discusses the application of proxy blind signature scheme in electronic commerce based on the mobile agent technology. Such a scheme applied, the mobile system can not only enhance the reliability of the mobile agent, but also can ensure its privacy on the current work. Meanwhile it provide the function to trace and audit those agents who have illegal actions or try to viciously attack others.
作者 吴敏 王汝传
出处 《南京邮电学院学报(自然科学版)》 EI 2005年第5期84-88,94,共6页 Journal of Nanjing University of Posts and Telecommunications
基金 国家自然科学基金(60573141和70271050) 江苏省自然科学基金(BK2005146) 江苏省自然基金预研项目(BK2004218) 江苏省高技术研究计划(BG2004004 BG2005037和BG2005038) 江苏省计算机信息处理技术重点实验室基金(kjs05001)资助项目
关键词 移动代理 代理盲签名 可信任的第三方 Mobile agent Proxy blind signature Trusted third party
  • 相关文献

参考文献12

  • 1JOHSON D, MENEZES A. The elliptic curve digital signature algorithm[ D]. Canada:Department of Combinatories and Optimization,University of Waterloo, 1999.
  • 2MAMBO M, USUDA K, OKAMOTO E. Proxy signature: Delgation of the power to sign messages[ J]. IEICE Trans on Fundamentals,1996,79(9) :1338 ~ 1353.
  • 3MAMBO M,USUD A K, OKAMOTO E. Proxy signatures for delegating signing operation[ A]. Proc 3rd ACM Conference on Computer and Communication Security[ C]. 1996. 48 ~57.
  • 4TAN Z, LIU Z, TANG C. Digital proxy blind signature schemes based on DLP and ECDLP[ R]. Beijing:Mathematics Mechanization Research Centre, Institute of System Sciences, Chinese Academy of Science, December 2002.
  • 5KIM S, PARK S, WON D. Proxy signatures: revisited[ A ]. In: Proc of ICICS' 97, International Conference on Information and Communications Security, Springer[ C ]. 1997. 223 ~ 232.
  • 6祁明,许柏桐.代理签名技术的研究与发展[J].计算机应用研究,2001,18(9):29-32. 被引量:15
  • 7CHAUM D. Blind signature system[ A]. Proceedings of Crypto' 83[C]. 1998.
  • 8PETERSEN H, HORSTER P. Self-certified keys-Concepts and Applications[ A ]. In: Proceeding of Communications and Multimedia Security' 97 [ C ]. 1997. 102 ~ 116.
  • 9BELLARE M, NAMPREMPRE C, POINTCHEVAL D, et al. The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme [ A ]. Financial Cryptographyl' 01 [ C ].2002.319 ~ 338.
  • 10CHAUM D. Bind signatues for untraceable payments[ A]. Advances in Cryptology Crypto' 82 [ C ]. 1983. 199 ~ 203.

二级参考文献3

共引文献14

同被引文献15

  • 1谷利泽,张胜,杨义先.代理盲签名方案及其在电子货币中的应用[J].计算机工程,2005,31(16):11-13. 被引量:19
  • 2黄文平.一些不需要安全通道代理签名的分析与改进[J].计算机工程与应用,2005,41(28):127-130. 被引量:6
  • 3Cha,J.C.& Cheon,J.H.(2003).An identity-based signature from gap diffie-hellman groups[C].Lect.Notes Computer Sci., 2567:18-30.
  • 4Boneh,D.,Lynn,B.& Shacham,H.(2001).Short Signature from the Well Pairing[C].Advances in Cryptology-Asiacrypt' 01, Springer Verlag.
  • 5Hwang, S.J. and Chen,C.C.(2001).A new multi-proxy multi-signature scheme~C].National Computer Symposium: Information Security, Taipei, F019-F026.
  • 6Mambo, M., Usuda, K. & Okamoto, E.(1996). Proxy Signature for Delegating Signing Operation[C]. Proceedings of the 3.th ACM Conference on Computer and Communications Security, New Detdi, India, ACM Press, New York, 48-57.
  • 7Mambo, M., Usuda, K. & Okamoto, E. Proxy Signature for Delegating Signing Operation[A].Proceedings of the 3.th ACM Conference on Computer and Communications Security, New Dehli, India[C].New York:ACM Press, 1996.48-57.
  • 8Cha, J.C. & Cheon, J.H.. An Identity-Based Signature From Gap Diffie-Hellman Groups[C].Lect. Notes Computer Sci,2003.18-30.
  • 9Boneh, D., Lynn, B., Shaeham, H.Short Signature from the Well Pairing [A].Advances in Cryptology-Asiaerypt'O1[C].Springer Verlag, 2001.
  • 10张弦,彭代渊.基于身份的高效代理签名方案[J].微计算机信息,2007,23(02X):39-40. 被引量:6

引证文献3

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部