期刊文献+

基于DSA的扩展自证明签名方案 被引量:1

Extend Self-certification Signature Scheme Based on DSA
在线阅读 下载PDF
导出
摘要 自证明签名对验证者来说一次仅验证了两个签名,而在PMI系统中,验证者除了要认证用户身份,其中包括两个验证:一个是验证用户的签名,另一个是验证CA颁发的公钥证书,还需要验证AA颁发的属性证书。针对此问题,该文对自证明签名做了一定的扩展,提出了扩展自证明签名ESCS方案,ESCS由验证两个签名扩展到可同时验证3个签名,此后又对ESCS方案做了进一步的扩展,扩展后的ESCS方案可以同时验证多个签名。 A verifier verifies only both signer's signature using self-certified signatures. In PMI system, verifier sides need verify AC issued by AA besides PKC issued by CA which includes two verificationsm, namely user sign and PKC. To the above problem, this paper proposes a new digital signature scheme called multi-certification signature which extents self-certified signatures and verifies two extented to three certifications once. Then, it extents more multi-certification signature which can veffy multi-signatures once.
出处 《计算机工程》 EI CAS CSCD 北大核心 2006年第19期1-2,5,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60372094)
关键词 扩展自证明签名 DSA PMI PKI Extend self-certification signature DSA PMI PKI
  • 相关文献

参考文献7

  • 1Pointcheval D, Stem J. Security Arguments for Digital Signatures and Blind Signatures[J]. Journal of Cryptology, 2000,13(3): 361-396.
  • 2Adams C, Llyod S. Understanding Public Key Infrastructure[M]. New Riders Publishing, 1999.
  • 3Lee B, Kim K. Self-certified Signature[C]. Proc. of Progress in Cryptology: INDOCRYPT'02, Lncs 2551. Springer-Verlag, 2002:199-214.
  • 4Girault M. Self-certified Public Keys[C]. Proc. of Advances in Cryptology: Eurocrypt'91, LNCS 547. Springer-Verlag, 1991: 490.
  • 5Lee B, Kim K. Self-certificate: PKI Using Self-certified Key[C]. Proc.of Conference on Information Security and Cryptology, 2000: 65-73.
  • 6Chadwick D. An X.509 Role-based Privilege Management Infrastructure[Z]. Business Briefing: Global Infosecurity, 2002.
  • 7Schnorr C P. Efficient Signatures Generation by Smart Cord[J].Journal of Cryptology, 1991,4(3): 161-174.

同被引文献12

  • 1HARN LEIN, MEHTA MANISH, HSIN WEN-JUNG. Integrating Diffie-Hellman Key Exchange into the Digital Signature Algorithm (DSA) [J]. IEEE Communications Letters, 2004, 8 (3): 198-200.
  • 2POPE NICK, CRUELLAS JUAN CARLOS. Oasis Digital Signature Services: Digital Signing without the Headaches [ J ]. IEEE Internet Computing, 2006, 10 (5) : 81-84.
  • 3NIKODEM M. DSA Signature Scheme Immune to the Fault Cryptanalysis [ C]// LNCS 5189. Berlin: Springer, 2008: 61- 73.
  • 4ELGAMAL T. A Public Key Cryptosystem and Signature Scheme Based on Discrete Logarithms [ J ]. IEEE Transactions on Information Theory, 1985, IT-31 (4) : 469-472.
  • 5FIPS-180-1-1995. Federal Information Processing Standard, Secure Hash Standard [S].
  • 6WANG Xiao-yun, YIN LISA YIQUN, YU Hong-bo. Finding Collisions in the Full SHA-1 [ C ] //LNCS 3621. Berlin: Springer, 2006 : 17-36.
  • 7National Institute of Standards and Technology. Comments Posted About SHA-1 Attacks [ EB/OL]. (2005-02-22) [ 2009- 03-30]. http: //csrc. nist. gov/news_ events/news_ archive/news_ archive_ 2005. html.
  • 8RIVEST R L, SHAMIR A, ADLEMAN L. A Method for Obtaining Digital Signatures and Public-Key Cryptosystem [ J ]. Comm ACM, 1978, 21 (1): 120-126.
  • 9FIPS-186-1994. Federal Information Processing Standard, Digital Signature Standard [ S ].
  • 10YEN SUNG-MING, LAIH CHI-SUNG. Improved Digital Signature Algorithm [ J]. IEEE Transactions on Computers, 1995, 44 (5) : 729-730.

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部