共查询到20条相似文献,搜索用时 15 毫秒
1.
In proxy signature schemes, an original signer A delegates its signing capability to a proxy signer B, in such a way that B can sign message on behalf of A.The recipient of the final message verifies at the same time that B computes the signature and that A has delegated its signing capability to B.Recently many identity-based(ID-based) proxy signature schemes have been proposed, however, the problem of key escrow is inherent in this setting.Certificateless cryptography can overcome the key escrow problem.In this paper, we present a general security model for certificateless proxy signature scheme.Then, we give a method to construct a secure certificateless proxy scheme from a secure certificateless signature scheme, and prove that the security of the construction can be reduced to the security of the original certificateless signature scheme. 相似文献
2.
多重数字签名的概念及方案的提出大大拓宽了数字签名的应用范围。基于椭圆曲线密码体制,提出了一种以椭圆曲线为基础的广播型多重数字签名方案。该方案研究了如何充分发挥椭圆曲线密码密钥长度短、效率高、安全强度大的优势来解决多重数字签名的缺陷,该方案可以有效地抵抗多种攻击,安全性高。 相似文献
3.
We describe a batch RSA digital signature scheme in which a signer can sign messages for multiple recipients simultaneously.
The construction is quite efficient due to the batch signing method. This is useful to improve the performance of a high-loaded
signing server, for example a secure electronic transaction (SET) gateway. Theoretical calculations and experimental results
show that the proposed scheme can improve the performance of the signing server significantly.
Foundation item: the National Basic Research Program (973) of China (No. 2005CB321804) 相似文献
4.
Recently some efforts were made towards capturing the security requirements within the composable security framework.This modeling has some significant advantages in designing and analyzing complex systems.The threshold signature was discussed and a definition was given based on the universal composability framework, which is proved to be equivalent to the standard security definition.Furthermore, a simple, effcient and proactive threshold RSA signature protocol was presented.It is proved to be correct, consistent and unforgeable relative to the environment that at most t-1 parties are corrupted in each proactive stage.It is also secure under the universal composability framework.It is a UC based security and is proved to be equivalent to the standard security. 相似文献
5.
Among several post quantum primitives proposed in the past few decades, lattice-based cryptography is considered as the most promising one, due to its underlying rich combinatorial structure, and the worst-case to average-case reductions. The first lattice-based group signature scheme with verifier-local revocation(VLR) is treated as the first quantum-resistant scheme supported member revocation, and was put forward by Langlois et al. This VLR group signature(VLR-GS) has group public key size of O(nm log N log q), and a signature size of O(tm log N log q log β). Nguyen et al. constructed a simple efficient group signature from lattice, with significant advantages in bit-size of both the group public key and the signature. Based on their work, we present a VLR-GS scheme with group public key size of O(nm log q) and signature size of O(tm log q). Our group signature has notable advantages: support of membership revocation, and short in both the public key size and the signature size. 相似文献
6.
To tackle the key-exposure problem in signature settings, this paper introduces a new cryptographic primitive named threshold
key-insulated signature (TKIS) and proposes a concrete TKIS scheme. For a TKIS system, at least k out of n helpers are needed to update a user’s temporary private key. On the one hand, even if up to k−1 helpers are compromised in addition to the exposure of any of temporary private keys, security of the non-exposed periods
is still assured. On the other hand, even if all the n helpers are compromised, we can still ensure the security of all periods as long as none of temporary private keys is exposed.
Compared with traditional key-insulated signature (KIS) schemes, the proposed TKIS scheme not only greatly enhances the security
of the system, but also provides flexibility and efficiency. 相似文献
7.
Secret sharing schemes are multi-party protocols related to key establishment. They also facilitate distributed trust or shared
control for critical activities (e.g., signing corporate cheques and opening bank vaults), by gating the critical action on
cooperation from t(t ∈ Z
+) of n(n ∈ Z
+) users. A (t, n) threshold scheme (t < n) is a method by which a trusted party computes secret shares Γ
i
(1 ⩽ i ⩽ n) from an initial secret Γ
0 and securely distributes Γ
i
to user. Any t or more users who pool their shares may easily recover Γ
0, but any group knowing only t−1 or fewer shares may not. By the ElGamal public key cryptophytes and the Schnorr’s signature scheme, this paper proposes
a new (t, n) threshold signature scheme with (k,m) (k,m ∈ Z
+) threshold verification based on the multivariate linear polynomial. 相似文献
8.
The only known construction of key-insulated signature (KIS) that can be proven secure in the standard model is based on the
approach of using double signing. That is, the scheme requires two signatures: a signature with a master key and a signature
with the signer’s secret key. This folklore construction method leads to an inefficient scheme. Therefore it is desirable
to devise an efficient KIS scheme. We present the first scheme with such a construction. Our construction derives from some
variations of the Waters’ signature scheme. It is computationally efficient and the signatures are short. The scheme is provably
secure based on the difficulty of computational Diffie-Hellman (CDH) problem in the standard model. 相似文献
9.
Practical identity-based aggregate signature from bilinear maps 总被引:1,自引:0,他引:1
A new identity-based(ID-based) aggregate signature scheme which does not need any kind of interaction among the signers was proposed to provide partial aggregation.Compared with the existing ID-based aggregate signatures, the scheme is more effcient in terms of computational cost.Security in the random oracle model based on a variant of the computation Diffe-Hellman(CDH) problem is captured. 相似文献
10.
It is important to ensure the private key secure in cryptosystem. To reduce the underlying danger caused by the private key
leakage, Dodis et al. (2003) introduced the notion of key-insulated security. To handle the private key leakage problems in
certificateless signature schemes, we propose a new certificateless strong key-insulated signature scheme. Our scheme has
two desirable properties. First, its security can be proved without utilizing the random oracle model. Second, it solves the
key escrow problems in identity-based key-insulated signatures (IBKISs). 相似文献
11.
In an identity based proxy signature (IBPS) scheme, a designated proxy signer can generate the signature on behalf of an original
signer. Traditional IBPS schemes normally rely on the assumption that private keys are kept perfectly secure. However, due
to viruses, worms or other break-ins allowed by operating-system holes, key exposure seems inevitable. To minimize the damage
caused by key exposure in IBPS, we propose an identity-based key-insulated proxy signature (IBKIPS) scheme in the standard
model, i.e. without random oracles. 相似文献
12.
Parallel Key-insulated Signature: Framework and Construction 总被引:1,自引:0,他引:1
To deal with the key-exposure problem in signature systems, a new framework named parallel key-insulated signature (PKIS) was introduced, and a concrete PKIS scheme was proposed. Compared with traditional key-insulated signature (KIS) schemes, the proposed PKIS scheme allows a frequent updating for temporary secret keys without increasing the risk of helper key-exposure. Moreover, the proposed PKIS scheme does not collapse even if some (not all) of the helper keys and some of the temporary secret keys are simultaneously exposed. As a result, the security of the PKIS scheme is greatly enhanced, and the damage caused by key-exposure is successfully minimized. 相似文献
13.
A directed signature is a type of signature with restricted verification ability. Directed signatures allow only a designated verifier to check the validity of the signature issued to him, and at the time of trouble or if necessary, any third party can verify the signature with the help of the signer or the designated verifier. Directed signature schemes are widely used in situations where the receiver’s privacy should be protected. Proxy signatures allow an entity to delegate its signing capability to another entity in such a way that the latter can sign message on behalf of the former when the former is not available. Proxy signature schemes have found numerous practical applications such as distributed systems and mobile agent applications. In this paper, we firstly define the notion of the directed proxy signature by combining the proxy signature and directed signature. Then, we formalize its security model and present a concrete scheme in the standard model. Finally, we use the techniques from provable security to show that the proposed scheme is unforgeable under the gap Diffie-Hellman assumption, and invisible under the decisional Diffie-Hellman assumption. 相似文献
14.
An identity-based verifiably committed signature scheme (IB-VCS) was proposed, which is proved secure in the standard model (i.e., without random oracles). It enjoys the setup-free property and stand-alone property, both of which make an exchange protocol more practical. The scheme is unconditionally secure against the cheating signer, its security against the cheating verifier is reduced to the computational Diffie-Hellman (CDH) problem in the underlying group, it is secure against the cheating trusted third party if the underlying Paterson Schuldt's identity based signature (IBS) scheme is secure, which is proven true based on the CDH assumption in the standard model. 相似文献
15.
Proxy signature has drawn great concerns.However, there still remains a challenge to construct a provably secure and effcient proxy signature scheme.In this paper, we propose an effcient proxy signature scheme based on factoring, and prove that it is secure in the random oracle.Furthermore, we present a new type of proxy signature, called Proxy Signature with Untrustworthy Proxy Signer, and construct a concrete scheme. 相似文献
16.
The universal composability framework is a new approach for designing and analyzing the security of cryptographic protocols. In this framework, the security of protocols is maintained under a general protocol composition operation. In the paper, we propose the universal composability framework for the analysis of proxy threshold signature and present a universally composable secure proxy threshold signature scheme which is the first one in this area. The proposed scheme is suitable for the mobile agents, which should migrate across different environment through network. Furthermore, we give the concrete analysis of the reduction to prove the security of the proposed scheme. 相似文献
17.
Grinding is known as the most complicated material removal process and the method for monitoring the grinding wheel wear has
its own characteristics comparing with the approaches for detecting the wear on regular cutting tools. Research efforts were
made to develop the wheel wear monitoring system due to its significance in grinding process. This paper presents a novel
method for identification of grinding wheel wear signature by combination of wavelet packet decomposition (WPD) based energies.
The distinctive feature of the method is that it takes advantage of the combinational information of the decomposed frequency
components based on the WPD so the extracted features can be customized according to the specific monitored object to get
better diagnosis effects. Experiments are researched on monitoring of grinding wheel wear states under different machining
conditions. The results show that the energy ratio extracted from the measured vibration signals is consistent with the grinding
wheel wear condition evaluated by experiment and the further extracted feature ratio can be used in prediction of wheel wear
condition. 相似文献
18.
Security of wireless sensor network (WSN) is a considerable challenge, because of limitation in energy, communication bandwidth and storage. ID-based cryptosystem without checking and storing certificate is a suitable way used in WSN. But key escrow is an inherent disadvantage for traditional ID-based cryptosystem, i.e., the dishonest key generation center (KGC) can forge the signature of any node and on the other hand the node can deny the signature actually signed by him/herself. To solving this problem, we propose an ID-based ring signature scheme without trusted KGC. We also present the accurate secure proof to prove that our scheme is secure against existential forgery on adaptively chosen message and ID attacks assuming the complexity of computational Diffie-Hellman (CDH) problem. Compared with other ring signature schemes, we think proposed scheme is more efficient. 相似文献
19.
依托铁路运输的物流企业是铁路运输在市场竞争条件下的产物,虽然仍属于传统的物流经营.但是其灵活性和良好的经济效益为其向现代化物流方向的发展奠定了良好的基础。 相似文献
20.
结合北黑公路第七标段工程测量实际,阐述了山区公路测量工作的特殊性,详细介绍了水准高程测设和中线测设的方法。 相似文献