...
首页> 外文期刊>Journal of China University of Mining and Technology >A (k, n) Threshold Nominative Proxy Signature Scheme for Electronic Commerce
【24h】

A (k, n) Threshold Nominative Proxy Signature Scheme for Electronic Commerce

机译:电子商务的(k,n)门限名义代理签名方案

获取原文
获取原文并翻译 | 示例

摘要

By using the Lagrange interpolation formula and the technology of signature of equality, a (k, n) threshold nominative proxy signature scheme is proposed, where an original signer delegates his (her) signing power to a proxy, who generates a nominative signature on behalf of the original signer and only k or more active verifiers in the n nominees (verifiers) nominated by the proxy signer can verify the signature signed by the proxy. If necessary, these (k or more) active nominees (verifiers) can prove its validity to a third party. In this scheme, the secret shares are generated and encrypted by the original signer. At the same time, the ciphertexts of the secret shares are used as parts of the signature. Then, the secret shares need not be sent to the nominees (verifiers) secretly. The ordinary nominative proxy signature can be viewed as a (1, 1) threshold nominative proxy signature. The ordinary nominative proxy signature can be viewed as a special case of a (k, n) threshold nominative proxy signature. According to the security analysis of this paper, it is found that our scheme is secure against a proxy signing key forgery attack and existential forgery on an adaptive chosen message attack.
机译:通过使用拉格朗日插值公式和等式签名技术,提出了一种(k,n)门限的名义代理签名方案,其中原始签署者将其(她)的签名权委托给代理,后者代表代理生成名义签名原始签名者的签名,并且在由代理签名者提名的n个被提名者(验证者)中只有k个或更多的活动验证者可以验证代理签名的签名。如有必要,这些(k个或更多)现役被提名人(验证人)可以向第三方证明其有效性。在这种方案中,秘密签名是由原始签名者生成和加密的。同时,秘密共享的密文用作签名的一部分。然后,无需将秘密份额秘密发送给被提名人(验证者)。普通的名义代理签名可以看作是(1,1)门限名义代理签名。普通的名义代理签名可以看作是(k,n)门限名义代理签名的特例。根据本文的安全性分析,发现我们的方案针对代理签名密钥伪造攻击和自适应选择消息攻击中的存在性伪造是安全的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号