一个保护隐私的代理签名方案的安全性分析

被引:1
作者
李丽媛
徐秋亮
机构
[1] 山东大学计算机科学与技术学院
关键词
保护隐私; 伪造攻击; 代理签名; 授权; 签名;
D O I
10.16208/j.issn1000-7024.2006.23.010
中图分类号
TP309 [安全保密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
在一个代理签名方案中,原始签名人授权代理签名人,代理签名人代表原始签名人生成有效的代理签名。在某些应用中,原始签名人可能希望代理签名人在不知道消息内容的情况下代表自己产生有效的签名。最近Dai等人提出了保护隐私的代理签名方案,但是Dai等人的方案不能抵抗伪造攻击,同时他们的方案不能满足上述安全要求。
引用
收藏
页码:4419 / 4420
页数:2
相关论文
共 9 条
[1]  
A public-key cryptosystem and signature schemebased on discrete logarithms. ELGamal T. IEEE Transactions on Information Theory . 1985
[2]  
Proxy signatures for delega-ting signing operation. Mambo M,Usuda K,Okamoto E. Proceeding 3rd ACM Conference onComputer and Communications Security . 1996
[3]  
Proxy signature:Delegationof the power to sign messages. Mambo M,,Usuda K,Okamoto E. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences . 1996
[4]  
Blind signature systems. Cham D. Proceedings ofCrypto‘83 . 1998
[5]  
A privacy-protec-ting proxy signature scheme and its application. Dai Jia-Zhu,Yang Xiao-Hu,Dong Jin-Xiang. . 2004
[6]  
Threshold proxy signature schemes. Zhang K. Infor-mation Security Workshop . 1997
[7]  
A proxy signa-ture scheme with proxy signer‘s privacy anonymity. Fu Xiao-tong,,Kou Wei-dong,Xiao Guo-zhen. Procee-dings of the IEEE international on E-Commerce Technology forDynamic E-Business . 2004
[8]  
Strong proxy signature and its applica-tions. Lee B,,Kim H,Kim K. Proc of SCIS . 2001
[9]  
A strong proxy signature scheme with proxysigner privacy protection. Shum K,Wei V K. Proceedingsof the Eleventh IEEE International Workshop on Enabling Tech-nologies:Infrastructure for Collaborative Enterprises . 2002