首页 | 本学科首页   官方微博 | 高级检索  
     检索      

对YTH门限代理签名方案的分析与改进
引用本文:胡江红,李哲峰.对YTH门限代理签名方案的分析与改进[J].宝鸡文理学院学报(自然科学版),2009,29(1).
作者姓名:胡江红  李哲峰
作者单位:宝鸡文理学院,数学系,陕西,宝鸡,721013;宝鸡文理学院,学报编辑部,陕西,宝鸡,721007
摘    要:目的 分析YANG,TZENG和HWANG2004年提出的门限代理签名方案(简称YTH方案).方法 利用有限域上离散对数困难问题和安全单向哈希函数对原方案进行改进.结果 分析YTH方案发现该方案是不安全的,容易受到公钥替换攻击,故提出了一种新的安全高效的门限代理盲签名方案.结论 新方案不仅避免了公钥替换攻击,而且还具有不可否认性和不可伪造性等安全门限代理签名和盲签名所具有的性质.

关 键 词:门限代理签名  公钥替换攻击  盲签名

Cryptanalysis and improvement of YTH threshold proxy signature scheme
HU Jiang-hong,LI Zhe-feng.Cryptanalysis and improvement of YTH threshold proxy signature scheme[J].Journal of Baoji College of Arts and Science(Natural Science Edition),2009,29(1).
Authors:HU Jiang-hong  LI Zhe-feng
Institution:1.Department of Mathematics;Baoji University of Arts and Sciences;Baoji 721013;Shaanxi;China;2.Editorial Department of Journals;Baoji 721007;China
Abstract:Aim The security of YTH scheme,which was proposed by YANG C Y,TZENG S F and HWANG M S in 2004 was analyzed.Methods The original scheme was improved on the basis of the discrete logarithm problem and the secure one-way Hash function in finite field.Results Through analyzing the security of YTH scheme,The scheme was found to be vulnerable to public-key substitute attack.A new blind threshold proxy signature scheme with high safety and efficiency is proposed.Conclusion The improved scheme can not only avoid pu...
Keywords:threshold proxy signature  public-key substitute attack  blind signature  
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号