首页 | 本学科首页   官方微博 | 高级检索  
     

人口信息管理和可视化系统的设计
引用本文:孔中哲,王英杰,余卓渊.人口信息管理和可视化系统的设计[J].计算机工程,2009,35(7):235-238,.
作者姓名:孔中哲  王英杰  余卓渊
作者单位:梁中银,史国炜,LIANG Zhong-yin,SHI Guo-wei(武警工程学院电子技术系网络与信息安全武警部队重点实验室,西安,710086);杨晓元,周宣武,YANG Xiao-yuan,ZHOU Xuan-wu(武警工程学院电子技术系网络与信息安全武警部队重点实验室,西安,710086;西安电子科技大学网络信息安全教育部重点实验室,西安,710071)  
摘    要:证明Lu Rongbo等人的代理签名方案(Proc. of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, 2007)不能抵抗替换公钥攻击和恶意但被动的密钥生成中心(KGC)攻击,普通攻击者可通过替换公钥伪造出有效的代理签名,KGC通过恶意但被动的KGC攻击可获得用户的私钥,从而能任意伪造出有效的代理签名.针对替换公钥攻击和KGC攻击,提出一个改进方案,新方案满足代理签名的安全性要求,能有效抵抗替换公钥攻击和恶意但被动的KGC攻击.

关 键 词:无证书公钥密码体制  代理签名  双线性对
修稿时间: 

Design of Population Information Management and Visualization System
LIANG Zhong-yin,YANG Xiao-yuan,ZHOU Xuan-wu,SHI Guo-wei.Design of Population Information Management and Visualization System[J].Computer Engineering,2009,35(7):235-238,.
Authors:LIANG Zhong-yin  YANG Xiao-yuan    ZHOU Xuan-wu  SHI Guo-wei
Affiliation:1.Key Laboratory of Network & Information Security of APF;Department of Electronic Technique;Engineering College of APF;Xi'an 710086;2.Key Laboratory of Network & Information Security of the Ministry of Education;Xidian University Xi'an 710071
Abstract:This paper shows that Lu's proxy signature is insecure against a key replacement attack and malicious-but-passive(KGC) attack.The attack shows that anyone who replaces both the original signer and the proxy signer's public key can forge valid signatures which seems to be generated by the proxy signer on behalf of this adversary himself, and KGC who can't replace the public key can get the signers' private keys and forge valid signatures.To thwart these attacks, this paper improves the scheme.The improved sc...
Keywords:ceritficateless public key cryptography  proxy signature  bilinear pairing  
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机工程》浏览原始摘要信息
点击此处可从《计算机工程》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号