期刊文献+

一个可控制的代理签名方案 被引量:2

One Controllable Proxy Signature Scheme
在线阅读 下载PDF
导出
摘要 在代理签名方案中,代理签名人可以代表原始签名人生成签名,在已知的各种代理签名方案中,代理签名人的签名次数为一次性的.在有些情形,需要一次委托,多次签名,而已知的代理签名方案不能满足这个需要,作者给出了一个新的代理签名方案,这个方案能够控制代理签名人的签名内容和次数. Proxy signature schemes allow a proxy signer to generate a proxy signature on behalf of an original signer, the proxy signature number of proxy signer is only one in previous proxy signature schemes. Some time, a proxy signature schemes which satisfies one entrust and more signature is needed, but previous proxy signature schemes can't. There is a new proxy signature scheme, in which,the frequency and contents of signature can be controlled.
出处 《四川大学学报(自然科学版)》 CAS CSCD 北大核心 2004年第5期982-985,共4页 Journal of Sichuan University(Natural Science Edition)
基金 省教育厅自然科学重点项目(2003A161)
关键词 名方 控制 次数 一次性 名人 生成 内容 代理签名 proxy signature discrete logarithms information security
  • 相关文献

参考文献8

  • 1[1]Mambo M, KUsuda. EOKamoto Proxy Signatures for Delegating Signing[A]. In proc 3rd. ACM Conference on Computer and Communications Security [C]. USA:ACM Press, 1996:48 - 57.
  • 2[2]Mambo M, USUDAK, OKAMOTOE. Proxy signatures : delegation of thepower tosignmessages[J]. IEICE Trans Fundam, 1996,E79-A(9) :1338- 1354.
  • 3[3]Zhang K. Threshold proxy signature schemes[M]. Berlin: Springer-verlag, 1998:191 - 197.
  • 4[4]Sun H M. An efficient nonrepudiable threshold proxy signature scheme with known signers[J]. Computer Communications,1999,22(8): 717 -722.
  • 5[5]Sun H M, Chen B J. Time-stamped proxy signatures with traceable receivers[A]. Proceedings of the ninth National Confer ence on Information Security[C]. Taiwan: Chaoyang University of Teahnology, 1999: 247- 253.
  • 6[6]SUN H M. Design of time-stamped proxy signatures with traceable receivers[J]. IEE Proc Computers & Digital Techniques, 2000,147(6): 462 - 466.
  • 7[7]Yi L J, Bai G Q, Xiao G Z. Proxy multi-signature scheme: A new type of proxy signature scheme[J]. Electron Lett,2000, 36(6) :527 - 528.
  • 8祁明,L.Harn.基于离散对数的若干新型代理签名方案[J].电子学报,2000,28(11):114-115. 被引量:67

二级参考文献2

共引文献66

同被引文献11

  • 1谷利泽,李中献,杨义先.不需要可信任方的匿名代理签名方案[J].北京邮电大学学报,2005,28(1):48-50. 被引量:24
  • 2YU Yong,YANG Bo,SUN Ying.Identity-based threshold signature and mediated proxy signature schemes[J].The Journal of China Universities of Posts and Telecommunications,2007,14(2):69-74. 被引量:3
  • 3MAMBO M, USUDA K, OKAMOTO E. Proxy signatures: delegation of the power to sign messages[ J]. IEICE Transaction Fundament, 1996, E79-A (9): 1338 -1354.
  • 4MAMBO M, USUDA K, OKAMOTO E. Proxy signatures for delegating signing operation[ C]// Proceedings 3rd ACM Conference on Computer and Communications Security. New Delhi: ACM Press, 1996:48 - 57.
  • 5SUN H M. Design of time-stamped proxy signatures with traceable receivers [ J]. IEE Proceedings of Computers & Digital Techniques, 2000, 147(6) : 462 -466.
  • 6Mambo M, Usuda K, Okamoto E. Proxy signature: delegation of the power to sign messages [ C ]// IEICE Trans. Fundamentals: [s.n. ], 1996: 1338-1353.
  • 7Seungjoo Kim, Sangjoo Park, Dongho Won. Proxy signatures, revisited [ J ]. Proceedings of International Conference on Information and Communications Security, Lecture Notes in Computer Science, 1997, 1334 (6): 223-232.
  • 8Lee Jung Yeun, Jung Hee Cheon, Seungjoo Kim. An analysis of proxy signatures: is a secure channel necessary? [ C ] // Topics in Cryptology-CT-RSA 2003, Lecture Notes in Computer Science. Berlin: [ s. n. ], 2003 : 68-79.
  • 9祁明,L.Harn.基于离散对数的若干新型代理签名方案[J].电子学报,2000,28(11):114-115. 被引量:67
  • 10伊丽江,白国强,肖国镇.代理多重签名[J].计算机研究与发展,2001,38(2):204-206. 被引量:31

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部