首页 | 本学科首页   官方微博 | 高级检索  
     检索      

基于椭圆曲线的不可否认门限代理签名方案
引用本文:袁丁,范平志.基于椭圆曲线的不可否认门限代理签名方案[J].西南交通大学学报,2007,42(1):8-12.
作者姓名:袁丁  范平志
作者单位:1. 西南交通大学移动通信研究所,四川,成都,610031;四川师范大学计算机科学学院,四川,成都,610068
2. 西南交通大学移动通信研究所,四川,成都,610031
基金项目:国家自然科学基金资助项目(60470303);四川省科技厅科技攻关项目(05GG007-008);四川省科技厅应用基础研究项目(04JY029-051-1);四川省教育厅重点课题基金资助项目(2003A085)
摘    要:针对已有的门限代理签名方案不能有效地抵抗签名人协作攻击和伪造攻击,以及在某些场合实用性不强的缺点提出了改进方案.在代理签名生成阶段要求每个实际签名人提供自己的私钥信息,在形成的代理签名中不仅包含每个代理签名人的秘密信息,还包含了每个实际签名人的秘密信息,从而能有效抵抗协作攻击和伪造攻击.另外,用椭圆曲线密码机制替换了已有的方案中用的ElGamal离散对数密钥机制,使系统效率更高.

关 键 词:门限代理签名  方案  椭圆曲线  协作攻击  伪造攻击  安全性  效率
文章编号:0258-2724(2007)01-0008-05
修稿时间:2006-01-19

Nonrepudiable Threshold Proxy Signature Scheme Based on Elliptic Curve Cryptography
YUAN Ding,FAN Pingzhi.Nonrepudiable Threshold Proxy Signature Scheme Based on Elliptic Curve Cryptography[J].Journal of Southwest Jiaotong University,2007,42(1):8-12.
Authors:YUAN Ding  FAN Pingzhi
Institution:1. Institute of Mobile Comm., Southwest Jiaotong University, Chengdu 610031, China; 2. School of Computer Science, Sichuan Normal University, Chengdu 610068, China
Abstract:An improved threshold proxy signature scheme was proposed to overcome the defects of the existing scheme that it can not resist conspiracy attacks and forgery attacks from the signers, and is not practical in some applications. In the signing process, every actual signer is required to put in his private key, which makes the signature contain secret information of both proxy signers and actual singers and resist conspiracy attacks and forgery attacks from the signers. An elliptic curve cryptography was used to replace ElGamal discrete logarithm cryptography in the original scheme, which makes the new scheme efficient.
Keywords:threshold proxy signature  scheme  elliptic curve  conspiracy attack  forgery attack  security  efficiency
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号