期刊文献+

基于DSA变体签名体制的盲代理多重签名方案 被引量:2

A New Blind Proxy Multi-Signature Schemes
在线阅读 下载PDF
导出
摘要 为实现一个盲代理签名方案能够同时代表多个原始签名人签名,人们提出了盲代理多重签名方案,克服了一个盲代理签名只能代表一个原始签名人签名的局限性.该文基于离散对数问题的困难性,在DSA变体盲代理签名的基础上,结合代理多重签名两种体制的优点,分别提出了具有盲代理签名和代理多重签名双重性质的第一类盲代理多重签名方案和第二类盲代理多重签名方案,并对两种方案的安全性进行了分析. To realize that a blind proxy signature could be on behalf of multiple original signers, blind proxy multi-signature was presented. This kind of signature could overcome the limitation that a blind proxy signature could not be on behalf of more than one original signer. Besides, on base of discrete logarithm, a first class of blind proxy multi-signature scheme and a second class of blind proxy multi-signature scheme were proposed based on both DSA blind proxy signature scheme and proxy multi-signature scheme. They have the properties of two proxy signature schemes, and their security was demonstrated.
出处 《湘潭大学自然科学学报》 CAS CSCD 北大核心 2008年第2期96-100,共5页 Natural Science Journal of Xiangtan University
基金 国家科技支撑计划课题(2006BAJ05A01) 国家自然科学基金资助项目(50677058) 江西省教育厅资助项目(273) 长沙理工大学资助项目
关键词 盲代理多重签名 离散对数 代理多重签名 盲代理签名 Blind Proxy Multi-signature Discrete Logarithm Proxy Multi-signature Blind Proxy Signatrue
  • 相关文献

参考文献6

  • 1CHAUM D. Blind signature for untraceable payments[C]//Proc. of the Crypto'82. New York: Springer-Verlag, 1983. 199-203.
  • 2MAMBO M, USUDA K, OKAMOTO E. Proxy signatures: delegation of the power to sign messages[J]. IEICE Trans on Fundamentals, 996,E792A(9):1 338-1 354.
  • 3MAMBO M, USUDA K, OKAMOTO E. Proxy signatures[C]//Proceedings of the 1995 Symposium on Cryptography and Information Security(SCIS 95) Japan, Inuyama, 1995:1-171.
  • 4祁明,许柏桐.代理签名技术的研究与发展[J].计算机应用研究,2001,18(9):29-32. 被引量:15
  • 5CAMENISCH J, PIVETEAU J M, STADLER M. Blind signatures based on the discrete logarithm problem[C]//Advances in Cryptology-EUROCRYPT'94, Lecture Notes in Computer Science. New York: Spring-Verlag, 1995 : 428-432.
  • 6康莉,蔡勉,王亚军.基于Nyberg-Rueppel签名体制的盲代理多重签名方案[J].通信学报,2007,28(3):115-119. 被引量:12

二级参考文献8

共引文献24

同被引文献23

  • 1侍伟敏,钮心忻,杨义先,高海英.基于DSA的扩展自证明签名方案[J].计算机工程,2006,32(19):1-2. 被引量:1
  • 2HARN LEIN, MEHTA MANISH, HSIN WEN-JUNG. Integrating Diffie-Hellman Key Exchange into the Digital Signature Algorithm (DSA) [J]. IEEE Communications Letters, 2004, 8 (3): 198-200.
  • 3POPE NICK, CRUELLAS JUAN CARLOS. Oasis Digital Signature Services: Digital Signing without the Headaches [ J ]. IEEE Internet Computing, 2006, 10 (5) : 81-84.
  • 4NIKODEM M. DSA Signature Scheme Immune to the Fault Cryptanalysis [ C]// LNCS 5189. Berlin: Springer, 2008: 61- 73.
  • 5ELGAMAL T. A Public Key Cryptosystem and Signature Scheme Based on Discrete Logarithms [ J ]. IEEE Transactions on Information Theory, 1985, IT-31 (4) : 469-472.
  • 6FIPS-180-1-1995. Federal Information Processing Standard, Secure Hash Standard [S].
  • 7WANG Xiao-yun, YIN LISA YIQUN, YU Hong-bo. Finding Collisions in the Full SHA-1 [ C ] //LNCS 3621. Berlin: Springer, 2006 : 17-36.
  • 8National Institute of Standards and Technology. Comments Posted About SHA-1 Attacks [ EB/OL]. (2005-02-22) [ 2009- 03-30]. http: //csrc. nist. gov/news_ events/news_ archive/news_ archive_ 2005. html.
  • 9RIVEST R L, SHAMIR A, ADLEMAN L. A Method for Obtaining Digital Signatures and Public-Key Cryptosystem [ J ]. Comm ACM, 1978, 21 (1): 120-126.
  • 10FIPS-186-1994. Federal Information Processing Standard, Digital Signature Standard [ S ].

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部