Computer Engineering and Applications ›› 2008, Vol. 44 ›› Issue (33): 89-92.DOI: 10.3778/j.issn.1002-8331.2008.33.028
• 网络、通信、安全 • Previous Articles Next Articles
XING Xing1,XIE Qi1,2
Received:
Revised:
Online:
Published:
Contact:
邢 星1,谢 琪1,2
通讯作者:
Abstract: Two attacks on Wang et al.’s threshold proxy signcryption scheme with shared verification show that their scheme are insecure.The one is that their scheme does not has the property of shared verification;the other is that their scheme cannot resist the attack of revising the warrant.Further,a modification to their threshold proxy signcryption scheme can satisfy the security requirement.
Key words: threshold proxy signcryption, shared verification, verification signcryption
摘要: 指出了王等的具有共享验证的门限代理签密方案存在两个安全性缺陷,一是该方案并不满足共享验证这一特性,二是代理组可修改授权证书。进一步,给出了改进方案,克服了原方案的缺陷。
关键词: 门限代理签密, 共享验证, 验证签密
XING Xing1,XIE Qi1,2. Analysis and improvement on threshold proxy signcryption scheme with shared verification[J]. Computer Engineering and Applications, 2008, 44(33): 89-92.
邢 星1,谢 琪1,2. 对共享验证门限代理签密方案的改进[J]. 计算机工程与应用, 2008, 44(33): 89-92.
0 / Recommend
Add to citation manager EndNote|Ris|BibTeX
URL: http://cea.ceaj.org/EN/10.3778/j.issn.1002-8331.2008.33.028
http://cea.ceaj.org/EN/Y2008/V44/I33/89