首页 | 本学科首页   官方微博 | 高级检索  
     

一种门限代理签名方案的分析与改进
引用本文:鲁荣波,何大可,王常吉.一种门限代理签名方案的分析与改进[J].电子学报,2007,35(1):145-149.
作者姓名:鲁荣波  何大可  王常吉
作者单位:1. 吉首大学数学与计算机科学学院,湖南吉首 416000;2. 西南交通大学信息安全与国 家计算网格实验室,四川成都 610031;3. 中山大学计算机科学系,广东广州 510275
摘    要:通过对Qian-cao-xue的基于双线性映射的的门限代理签名方案分析,发现该方案并不满足强不可伪造性,任何人包括原始签名人可以伪造一个有效的代理签名,同时该方案也不能抵抗原始签名人改变攻击.在此基础上提出了改进的门限代理签名方案(方案1),改进的方案克服了原方案的安全缺陷.并把矢量空间秘密共享和多重代理签名结合起来,构建了一种更为广泛的基于访问结构的多重代理签名(方案2).门限代理签名方案(方案1)成为方案2的特殊情形.方案2中任何参与者的授权子集能产生多重代理签名,而非参与者不可能产生有效的多重代理签名,接收者可以通过验证方法验证个体代理签名和多重代理签名的合法性,而且能保证任何参与者都能检测出错误的子秘密.能抵御各种可能的攻击.

关 键 词:门限代理签名  双线性映射  强不可伪造性  原始签名人改变攻击  矢量空间秘密共享  
文章编号:0372-2112(2007)01-0145-05
收稿时间:2005-12-12
修稿时间:2005-12-122006-08-14

Cryptanalysis and Improvement of a Threshold Proxy Signature Scheme from Bilinear Pairings
LU Rong-bo,HE Da-ke,WANG Chang-ji.Cryptanalysis and Improvement of a Threshold Proxy Signature Scheme from Bilinear Pairings[J].Acta Electronica Sinica,2007,35(1):145-149.
Authors:LU Rong-bo  HE Da-ke  WANG Chang-ji
Affiliation:1. College of Math and Computer Science,Jishou University,Jishou,Hunan 416000,China;2. Laboratory of Information Security and National Computing Gird,Southwest Jiaotong University,Chengdu,Sichuan 610031,China;3. Department of Computer Science,Sun Yat-Sen University,Guangzhou,Guangdong 510275,China
Abstract:Present a security analysis of the Qian-cao-xues new threshold proxy signature scheme from bilinear pairings,which does not posses the strong unforgeability property,anyone including original signer can forge a valid threshold proxy signature for any message,at the same time,this scheme can't resist original signer changing attack.An improved threshold proxy signature scheme (denoted as scheme one) is proposed,which can resolve the security problem existing in the Qian-cao-xues new threshold proxy signature scheme.Based on scheme one,by combining vector space secret sharing with multi-proxy signature,a new and wider multi-proxy signature (denoted as scheme two) is constructed.Then scheme one becomes the typical representative of scheme two.In scheme two,the multi-proxy signature can be easily produced if an authorized subset of participants pool their secret shares,and it is impossible for them to generate a multi-proxy signature if an unauthorized subset of participants pool their secret shares.The validity of the partial signature and the multi-proxy signature can be verified by means of verification equations.Moreover the suspected forgery can be traced and the malicious participants can be caught.None of the possible attacks can successfully break this scheme.
Keywords:threshold proxy signature  bilinear pairing  strong unforgeability  original signer changing attack  vector space secret sharing
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《电子学报》浏览原始摘要信息
点击此处可从《电子学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号