摘要: 研究一种(t, n)门限代理(c, m)门限签名方案,发现无论是原始方案还是其2个改进方案都无法抵抗合谋攻击和替换公钥攻击。为此,通过在代理签名生成阶段增加实际签名者的身份信息,提出一个具有识别并追踪恶意签名者特性的改进方案。分析结果表明,该方案能够有效抵抗合谋攻击和替换公钥攻击。
关键词:
代理签名,
门限代理签名,
数字签名,
原始签名者,
代理签名者,
合谋攻击
Abstract: This paper presents a (t, n) threshold proxy (c, m) threshold signature scheme. It finds that either the original scheme or two improved schemes are vulnerable to collusion attack and public-key substitute attack. By including the identities of the actual signers in the proxy signature generation phase, it proposes a new threshold proxy threshold signature scheme with the property that the actual signers from the proxy group are identified and traceable. Analysis results show that the scheme can resist the mentioned attacks efficiently.
Key words:
proxy signature,
threshold proxy signature,
digital signature,
original signer,
proxy signer,
collusion attack
中图分类号:
原变青, 张忠. 门限代理签名方案的分析与改进[J]. 计算机工程, 2012, 38(7): 119-121.
YUAN Bian-Jing, ZHANG Zhong. Analysis and Improvement of Threshold Proxy Signature Scheme[J]. Computer Engineering, 2012, 38(7): 119-121.