检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:Lu Rongbo He Dake Wang Chanji
机构地区:[1]College of Mathematics and Computer Science, Jishou University, Jishou 416000, China [2]Laboratory of Information Security and National Computing Gird, Southwest Jiaotong University, Chengdu 610031, China [3]Department of Computer Science, -Sun Yat-Sen University, Guangzhou 510275, China
出 处:《Journal of Electronics(China)》2008年第3期372-377,共6页电子科学学刊(英文版)
基 金:Supported by the National Natural Science Foundation of China (No.60503005);the Natural Science Foundation of Hunan Province (No.07JJ6110)
摘 要:Kang, et al. [Journal of Electronics(China), 23(2006)4] proposed a threshold multi-proxy multi-signature scheme, and claimed the scheme satisfies the security requirements of threshold multi-proxy multi-signature. However, in this paper, two forgery attacks are proposed to show that their schemes have serious security flaws. To overcome theses flaws, an improvement on Kang, et al.’s scheme is proposed.Kang, et al. [Journal of Electronics(China), 23(2006)4] proposed a threshold multi-proxy multi-signature scheme, and claimed the scheme satisfies the security requirements of threshold multi-proxy multi-signature. However, in this paper, two forgery attacks are proposed to show that their schemes have serious security flaws. To overcome theses flaws, an improvement on Kang, et al.'s scheme is proposed.
关 键 词:Proxy signature Threshold proxy signature Multi-proxy multi-signature Forgery attack
分 类 号:TN309[电子电信—物理电子学]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.249