共查询到19条相似文献,搜索用时 46 毫秒
1.
2.
3.
提出了一种新的签名:有代理的多重签名。它是一种特殊的多重签名,允许部分签名人委托其代理人代替他进行多重签名。事实上,普通的多重签名和代理多重签名可以看作这种签名的特殊形式,因此讨论这种签名的安全性有助于多重签名和代理多重签名的安全性研究。之后提出了两种基于离散对数密码体制的有代理的多重签名方案,证明了这两个方案的正确性,并对这两个方案的安全性进行了详细的讨论和分析。 相似文献
4.
5.
更为有效的代理数字签名方案 总被引:1,自引:0,他引:1
针对Z.Fangguo和R.Safavi-Nalni给出的代理签名方案实现效率慢的问题,做了一些必要的改进,提出了效率更高,实现速度更快的基于双线性对的代理数字签名方案,并从存储空间和实现速度上系统证明了新方案的优越性。另外,运用这种新方案的思想,进一步提出了新的代理多重签名、多重代理签名和多重代理多重签名方案。 相似文献
6.
基于离散对数的多重代理多重签名方案的改进 总被引:2,自引:0,他引:2
在多重代理多重签名体制中,多个原始签名者可以将签名权利委托给多个代理签名者,再由这些代理签名者联合生成一个代表所有原始签名者的数字签名。文献[1]提出了相应的方案,并且证明了在授权者和代理者都遵守签名协议的假设下安全性等价于离散对数难解问题。但这只是一种理想情况。经研究我们发现这个体制存在部分原始签名者日后抵赖授权和部分代理签名者日后抵赖签名的情况。本文对该方案进行改进,使方案具有抗抵赖性。 相似文献
7.
8.
文中采用双线性对的签名和验证方式,提出了一种基于身份的多重代理盲签名方案。它综合了多重代理签名和盲签名的优点,能够有效地防止授权人冒充多重代理人对消息进行签名。 相似文献
9.
一个前向安全的强代理签名方案 总被引:15,自引:0,他引:15
基于代理签名理论和前向安全签名理论,提出了一个前向安全的强代理签名方案,其安全性建立在求离散对数和模合数求平方根是困难的这两个假设的基础上。此方案同时对代理签名人和原始签名人的权益提供了保护,攻击者即使在第i时段入侵系统,也无法伪造第i时段之前的签名,因而具有较高执行效率和较强的安全性。 相似文献
10.
11.
一种代理多签名体制的安全性分析 总被引:3,自引:0,他引:3
对Ji和Li的基于椭圆曲线离散对数问题的代理多签名体制提出了两个伪造攻击。利用这两个伪造攻击,任何一个原始签名人都能伪造出一个有效的代理多重数字签名。并对Ji和Li的代理多签名体制进行了改进,提出了新的安全的基于椭圆曲线离散对数问题的代理多签名体制。 相似文献
12.
高效的无证书有序多重签名方案 总被引:2,自引:0,他引:2
针对分布式环境下信任建模中信任链上推荐信息的认证问题,研究了无证书有序多重签名方案的安全模型,进而基于椭圆曲线密码和双线性映射提出一个无证书有序多重签名方案,并在随机预言机模型下,证明方案的安全性建立在计算 Diffie-Hellman 问题的困难性上。该方案无需证书管理中心,多重签名的长度与单用户的签名长度相当,与签名人数无关,在部分签名阶段不需双线性对运算,在部分签名及整体签名的验证阶段都只需一个双线性对运算,与同类方案相比,具有运行效率上的优势,可方便地应用于大规模分布式环境下信任传播的过程中。 相似文献
13.
A sequential multi-signature enabled multiple users to jointly sign a document in order.Xu,et al proposed a provably-secure certificateless sequential multi-signature scheme with constant signature length and pairing computations.However,it was shown that the scheme had a drawback in the verifying algorithm,and then it overcame the drawback.But,the efficiency of the corrected scheme was greatly reduced.An efficient certificateless sequential multi-signature scheme is constructed,and the multi-signature generated by proposed scheme consists of one group element and the verification algorithm requires only 2 bilinear pairings. 相似文献
14.
In the Paper, we proposed a threshold mult- proxy multi-signature with share verification.In the scheme,a subset of original signers allows a designated group to proxy signers to sign on behalf of the original group, A message m has to be signed of proxy signers who can represent the proxy group. Then, the proxy signature is sent to the verifier group.A subset of verifiers in the verifier group can also represent the group to authenticate the proxy signature.In othe words,some threshold values will be given to indicate the number of persons to represent a group to authorize the signing capability or to sign a messagye or to verify the proxy signature. 相似文献
15.
A new threshold multi-proxy multi-signature scheme 总被引:2,自引:0,他引:2
Kang Baoyuan Han Jingguang Wang Qinju 《电子科学学刊(英文版)》2006,23(4):560-563
I. Introduction Digital signatures to electronic documents are just as the handwritten signatures to paper ones. Es-sentially, digital signatures provide integrity, un-forgeability, and the non-repudiation properties for electronic documents, and play the important role in electronic commerce or modern cryptographic ap-plications. Mambo, et al., proposed the proxy sig-nature scheme in 1996[1]. In the proxy signature scheme, an original signer is allowed to authorize a designated person as his… 相似文献
16.
An improved charge-averaging charge-pump scheme is described in the paper. The circuit mainly includes four pairs of switches
and four sampling capacitors. Two operation modes (normal/charge-averaging) are achieved by switching on/off. SpectreVerilog
simulation results show the proposed scheme can strongly reduce the energy of spurs, and could be applied to high performance
frequency synthesizers. 相似文献
17.
代理重加密方案使一个半可信的代理者将用委托者的公钥加密的密文转换成用受委托者公钥加密的密文,在转换其间代理者不能获得相关的明文信息。基于证书的公钥密码体制克服了传统公钥密码体制和基于身份密码体制的缺点与不足,为此将证书加密体制与代理重加密结合起来,提出了一个在随机预言模型下的适应性选择密文安全的基于证书代理重加密方案。 相似文献
18.
19.
Multiserver authentication complies with the up‐to‐date requirements of Internet services and latest applications. The multiserver architecture enables the expedient authentication of subscribers on an insecure channel for the delivery of services. The users rely on a single registration of a trusted third party for the procurement of services from various servers. Recently, Chen and Lee, Moon et al, and Wang et al presented multiserver key agreement schemes that are found to be vulnerable to many attacks according to our analysis. The Chen and Lee scheme was found susceptible to impersonation attack, trace attack, stolen smart card attack exposing session key, key‐compromise impersonation attack, and inefficient password modification. The Moon et al is susceptible to stolen card attack leading to further attacks, ie, identity guessing, key‐compromise impersonation attack, user impersonation attack, and session keys disclosure, while Wang et al is also found to be prone to trace attack, session‐specific temporary information attack, key‐compromise information attack, and privileged insider attack leading to session key disclosure and user impersonation attacks. We propose an improved protocol countering the indicated weaknesses of these schemes in an equivalent cost. Our scheme demonstrates automated and security analysis on the basis of Burrows‐Abadi‐Needham logic and also presents the performance evaluation for related schemes. 相似文献