计算机工程与应用 ›› 2010, Vol. 46 ›› Issue (23): 85-87.DOI: 10.3778/j.issn.1002-8331.2010.23.024

• 网络、通信、安全 • 上一篇    下一篇

指定接收人的(tn)门限代理签名方案

米军利1,李苏北1,张建中2   

  1. 1.徐州工程学院 数学与物理科学学院,江苏 徐州 221008
    2.陕西师范大学 数学与信息科学学院,西安 710062
  • 收稿日期:2008-12-30 修回日期:2009-03-02 出版日期:2010-08-11 发布日期:2010-08-11
  • 通讯作者: 米军利

tn) threshold proxy signature scheme with designated receiver

MI Jun-li1,LI Su-bei1,ZHANG Jian-zhong2   

  1. 1.School of Mathematics and Physical Science,Xuzhou Institute of Technology,Xuzhou,Jiangsu 221008,China
    2.College of Mathematics and Information Science,Shaanxi Normal University,Xi’an 710062,China
  • Received:2008-12-30 Revised:2009-03-02 Online:2010-08-11 Published:2010-08-11
  • Contact: MI Jun-li

摘要: 为了满足原始签名人的意愿,提出一个指定接收人的门限代理签名方案。在代理授权的过程中,原始签名人通过授权指定代理签名的接收人,代理签名人在验证原始签名人所提供的授权参数合法的基础上产生代理签名密钥,从而可以产生代理签名。提出的签名方案具有代理签名方案的基本安全要求:不仅验证人在验证代理签名之后只能确信代理签名是代表原始签名人的签名而无法确定代理签名者身份;当出现争议时,原始签名人可通过代理群管理员追查出代理签名人的身份;而且保证代理签名人只能对所指定的签名接收人产生代表原始签名人的有效代理签名,从而防止了代理签名权利的滥用。

关键词: 代理签名, 指定接收人, 合谋攻击, 可跟踪性

Abstract: To satisfy the original signer hope,a threshold proxy signature scheme is proposed with designated receiver.The original signer nominates a receiver of proxy signature during the generation process of delegation parameters.When he delegates his signing power to a proxy signer,the proxy signer generates proxy signature on behalf of him by the nominative signature scheme.It satisfies the basic security requirements of proxy signature:The identity of the proxy signer can not be known at the same time;when disputation appears,the original signer can reveal the real identity of the proxy signer with the help of the GP;furthermore,the valid proxy signature generated by the proxy signer on behalf of the original signer can only be verified and thus accepted by the receiver nominated by the original signer.

Key words: proxy signature, designated receiver, conspiracy attack, traceability

中图分类号: