作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2006, Vol. 32 ›› Issue (17): 216-218,. doi: 10.3969/j.issn.1000-3428.2006.17.076

• 安全技术 • 上一篇    下一篇

具有自我认证公钥和消息恢复的门限代理方案

王庆菊;亢保元;韩金广   

  1. 中南大学数学科学与计算技术学院,长沙 410075
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2006-09-05 发布日期:2006-09-05

Self-certified Threshold Proxy Signature Scheme with Message Recovery

WANG Qingju;KANG Baoyuan; HAN Jinguang   

  1. School of Mathematical Science and Computing Technology, Central South University, Changsha 410075
  • Received:1900-01-01 Revised:1900-01-01 Online:2006-09-05 Published:2006-09-05

摘要: 方案中原始签名人和代理签名人公钥的认证,代理签名合法性的验证和签名消息的恢复是同时执行的。取消了Shamir门限秘密分享方案在代理密钥生成阶段的应用,所有代理签名人持有共同的代理密钥,既有效地抵御了合谋攻击,又减小了计算复杂性。同时将代理证书与代理签名的生成结合起来,克服了伪造攻击。真实的代理签名人无法否认他们的代理签名。

关键词: 门限代理, 自我认证公钥, 消息恢复, 不可否认性, 可跟踪性

Abstract: In the scheme, the authenticity of the original and proxy signer signers’public keys, the validity of the proxy signature and the message recovery can be simultaneously performed in a single step. In the proxy share generation stage, due to the revocation of Shamir’s threshold secret sharing scheme, each proxy signer in the proxy group owns the common proxy share, this can not only efficiently withstand the coalition attack, but also reduce the computational complexities. Furthermore, the proxy warrant created in the proxy share generation stage is integrated with the proxy signature generation, this can overcome the forgery attack. Meanwhile, the actual proxy signers cannot deny the proxy signature they have signed.

Key words: Threhold proxy, Self-certified public key, Message recovery, Nonrepudiation, Traceability