作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2008, Vol. 34 ›› Issue (24): 170-171. doi: 10.3969/j.issn.1000-3428.2008.24.059

• 安全技术 • 上一篇    下一篇

基于椭圆曲线密码的安全门限代理签名方案

田志刚1,鲍皖苏1,张 炜2   

  1. (1. 解放军信息工程大学电子技术学院,郑州 450004;2. 解放军装甲兵工程学院,北京 100072)
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2008-12-20 发布日期:2008-12-20

Secure Threshold Proxy Signature Scheme Based on Elliptic Curve Cryptography

TIAN Zhi-gang1, BAO Wan-su1, ZHANG Wei2   

  1. (1. Institute of Electronic Technology, PLA Information Engineering University, Zhengzhou 450004;2. Academy of Armored Forces Engineering of PLA, Beijing 100072)
  • Received:1900-01-01 Revised:1900-01-01 Online:2008-12-20 Published:2008-12-20

摘要: 现有的门限代理签名方案大多基于有限域乘法群上的离散对数。基于ElGamal离散对数的密码机制存在密钥过长、密钥管理难等缺陷。该文针对上述缺陷,提出一个基于椭圆曲线密码机制的门限代理方案,满足了门限代理签名的性质,且能抵抗合谋攻击。

关键词: 代理签名, 门限代理签名, 椭圆曲线, 合谋攻击

Abstract: Most threshold proxy signature schemes are constructed on the base of discrete logarithm in infinite fields. Discrete logarithm cryptography based on ElGamal has some drawbacks such as long keys and difficult key management, which seriously limit its practical application. Elliptic curve cryptography is introduced and a threshold proxy signature scheme based on the cryptography is proposed, which can satisfy the properties of the threshold proxy signature, and withstand the conspiracy attack.

Key words: proxy signature, threshold proxy signature, elliptic curve, conspiracy attack

中图分类号: