作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2007, Vol. 33 ›› Issue (12): 175-177. doi: 10.3969/j.issn.1000-3428.2007.12.061

• 安全技术 • 上一篇    下一篇

一个已知签名人的门限代理签名方案的改进

刘昌远1,徐秋亮2   

  1. (1. 山东大学齐鲁软件学院,济南 250101;2. 山东大学计算机科学与技术学院,济南 250100)
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2007-06-20 发布日期:2007-06-20

Improvement of Threshold Proxy Signature Scheme with Known Signers

LIU Changyuan1, XU Qiuliang2   

  1. (1. Qilu Software Collage, Shandong University, Jinan 250101; 2. Department of Computer Science & Technology, Shandong University, Jinan 250100)
  • Received:1900-01-01 Revised:1900-01-01 Online:2007-06-20 Published:2007-06-20

摘要: (t, n)门限代理签名方案是指由指定n个代理签名者的群中的t个或多于t个代理签名者合作代表原始签名人对消息进行签名的方案。Hsu等人提出的已知签名者的不可否认门限代理签名方案(HWW方案)克服了Sun提出的门限代理签名方案的缺点。Tan等人对HWW方案进行了安全性分析,指出其不能抵抗原始签名人与系统权威的合谋攻击。该文指出在HWW方案中,原始签名人与代理签名者合谋也可伪造代理签名,并给出了一个改进方案。

关键词: 数字签名, 门限代理签名, 合谋攻击

Abstract: In a (t, n) threshold proxy signature scheme, which is a variant of the proxy signature scheme, the proxy signature key is shared among n proxy signers delegated by the original signer. Any t or more proxy signers can cooperatively sign messages on behalf of the original signer. Hsu, etc. propose a nonrepudiable threshold proxy signature scheme with known signers (HWW scheme), overcoming the disadvantages of the scheme proposed by Sun. Tan, etc. carry out the secure analysis on the HWW scheme and point out that it cannot resist the original signer and the system authority’s conspiracy attack. This paper points out that the original signer and proxy signer conspiracy may forge a legal proxy signature in the HWW scheme and gives an improved scheme.

Key words: Digital signature, Threshold proxy signature, Conspiracy attack

中图分类号: