具有已知代理人的不可否认门限代理签密方案
作者:
基金项目:

Supported by the National Natural Science Foundation of China under Grant Nos.60072018, 60273082 (国家自然科学基金); the National Natural Science Foundation of China for Distinguished Young Scholars under Grant No.60225007 (国家杰出青年科学基金); the National Research Foun

  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [19]
  • |
  • 相似文献 [20]
  • |
  • 引证文献
  • | |
  • 文章评论
    摘要:

    1996年,Mambo等人提出了代理签名概念.但是,代理签名仅能提供授权的认证而不能提供保密性.Chan和Wei提出一个门限代理签密方案(记为Chan-Wei方案),扩展了代理签名的概念.指出他们的方案不满足强不可伪造性、强不可否认性和强识别性.基于Chan-Wei方案,提出一个能够克服Chan-Wei方案缺点的不可否认门限代理签密方案.给出方案的完备性证明和安全性分析.此外,与Chan-Wei方案相比,所提出的方案能够确切地发现哪些代理人提供假子密钥或篡改子密钥.

    Abstract:

    In 1996, Mambo et al. introduced the concept of proxy signature. However, a proxy signature only provides the delegated authenticity and doesn't provide the confidentiality. Chan and Wei proposed a threshold proxy signcryption scheme (denoted as Chan-Wei scheme), which extended the concept of proxy signature. In this paper, the authors demonstrate Chan-Wei scheme does not satisfy strong unforgeablity, strong nonrepudiation and strong identifiability. Based on Chan-Wei scheme, a nonrepudiable threshold proxy signcryption scheme with known proxy agents is proposed. The proposed scheme overcomes the weaknesses of Chan-Wei scheme. Completeness proof and security analysis of the proposed scheme are presented. In addition, compared with Chan-Wei scheme, the proposed scheme exactly finds out which proxy agents present bogus secret shadow or tamper secret shadow.

    参考文献
    [1]Mambo M, Usuda K, Okamoto E. Proxy signatures: Delegation of the power to sign messages. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 1996,E79-A(9):1338~1353.
    [2]Lee B, Kim H, Kim K. Secure mobile agent using strong non-designated proxy signature. In: Varadharajan V, Mu Y, eds. Proceedings of the ACISP2001. LNCS 2119, Berlin: Springer-Verlag, 2001. 474~486.
    [3]Lee B, Kim H, Kim K. Strong proxy signature and its application. In: Proceedings of the SCIS2001. 11B-1, 2001. 603~608.
    [4]Kim S, Park S, Won D. Proxy signatures, revisited. In: Han Y, et al. eds. Proceedings of the ICICS'97 International Conference on Information and Communications Security. LNCS 1334, Berlin: Springer-Verlag, 1997. 223~232.
    [5]Sun HM, Lee NY, Hwang T. Threshold proxy signatures. IEE Proc.-Computers & Digital Techniques, 1999,146(5):259~263.
    [6]Sun HM. An efficient nonrepudiable threshold proxy signature scheme with known signers. Computer Communications, 1999, 22(8):717~722.
    [7]Hwang MS, Lin IC, Lu EJL. A secure nonrepudiable threshold proxy signature scheme with known signers. International Journal of Informatica, 2000,11(2):1~8.
    [8]Sun HM. Design of time-stamped proxy signatures with traceable receivers. IEE Proc.-Computers & Digital Techniques, 2000, 147(6):462~466.
    [9]Hsu CL, Wu TS, Wu TC. New nonrepudiable threshold proxy signature scheme with known signers. The Journal of Systems and Software, 2001,58(2):119~124.
    [10]Yi LJ, Bai GQ, Xiao GZ. Proxy multi-signature scheme: A new type of proxy signature scheme. Electronics Letters, 2000,36(6): 527~528.
    [11]Li JG, Cao ZF, Zhang YC. Improvement of M-U-O and K-P-W proxy signature schemes. Journal of Harbin Institute of Technology, 2002,9(2):145~148.
    [12]Li JG, Cao ZF. Improvement of a threshold proxy signature scheme. Journal of Computer Research and Development, 2002, 39(11):1513~1518 (in Chinese with English abstract).
    [13]Li JG, Cao ZF, Zhang YC, Li JZ. Cryptographic analysis and modification of proxy multi-signature scheme. High Technology Letters, 2003,13(4):1~5 (in Chinese with English abstract).
    [14]Li JG, Cao ZF, Zhang YC. Nonrepudiable proxy multi-signature scheme. Journal of Computer Science and Technology, 2003,18(3): 399~402.
    [15]Gamage C, Leiwo J, Zheng Y. An efficient scheme for secure message transmission using proxy-signcryption. In: Edwards J, ed. Proceedings of the 22th Australasian Computer Science. Auckland: Springer-Verlag, 1999. 420~431.
    [16]Chan WK, Wei VK. A threshold proxy signcryption. In: Proceedings of the 2002 International Conference on Security and Management (SAM2002). Monte Carlo Resort, Las Vegas, Nevada, 2002.
    [17]Pedersen TP. A threshold cryptosystem without a trusted party. In: Davies DW, ed. Proceedings of the Advances in Cryptology- Eurocrypt'91. LNCS 547, Brighton: Springer-Verlag, 1991. 552~526.
    [18]李继国,曹珍富.一个门限代理签名方案的改进.计算机研究与发展,2002,39(11):1513~1518.
    [19]李继国,曹珍富,张亦辰,李建中.代理多重签名方案的密码分析与修改.高技术通讯,2003,13(4):1~5.
    网友评论
    网友评论
    分享到微博
    发 布
引用本文

李继国,李建中,曹珍富,张亦辰.具有已知代理人的不可否认门限代理签密方案.软件学报,2003,14(12):2021-2027

复制
分享
文章指标
  • 点击次数:4479
  • 下载次数: 5524
  • HTML阅读次数: 0
  • 引用次数: 0
历史
  • 收稿日期:2002-09-18
  • 最后修改日期:2002-09-18
文章二维码
您是第19626666位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京市海淀区中关村南四街4号,邮政编码:100190
电话:010-62562563 传真:010-62562533 Email:jos@iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号