Computer Engineering and Applications ›› 2009, Vol. 45 ›› Issue (9): 117-119.DOI: 10.3778/j.issn.1002-8331.2009.09.034
• 网络、通信、安全 • Previous Articles Next Articles
TIAN Zhi-gang,BAO Wan-su
Received:
Revised:
Online:
Published:
Contact:
田志刚,鲍皖苏
通讯作者:
Abstract: In the ID-based crypto system,user’ public key is decided by his ID which is not distributed by CA.This way has solved the problem of public key’s storage and management.In a threshold proxy signature,the power of signature is distributed to a signature group which can prevent the abuse of the power.This article introduces an ID-based threshold signature scheme which uses bilinear parings.In addition,an analysis is given about the relevant security of this scheme.And this scheme can also withstand the conspiracy attack.
摘要: 在基于身份的密码体制中,用户的公钥由用户的身份信息决定,不需要CA颁发公钥证书,解决了公钥存储和管理问题。门限代理签名因其可以将签名权利分散于一个签名团体,可以有效防止代理签名权的滥用而受到广泛关注。基于双线性映射对构造了一个基于身份的门限代理签名方案,分析了方案的可区分性、可验证性、强不可伪造性、强可识别性、强不可否认性等安全特性,并指出该方案可以很好地抵抗合谋攻击。
TIAN Zhi-gang,BAO Wan-su. ID-based threshold proxy signature Scheme[J]. Computer Engineering and Applications, 2009, 45(9): 117-119.
田志刚,鲍皖苏. 基于身份的门限代理签名方案[J]. 计算机工程与应用, 2009, 45(9): 117-119.
0 / Recommend
Add to citation manager EndNote|Ris|BibTeX
URL: http://cea.ceaj.org/EN/10.3778/j.issn.1002-8331.2009.09.034
http://cea.ceaj.org/EN/Y2009/V45/I9/117