Advanced Search
Volume 26 Issue 12
Dec.  2004
Turn off MathJax
Article Contents
Huang Zhen-jie, Hao Yan-hua, Wang Yu-min. Nominative Signature and Nominative Proxy Signature[J]. Journal of Electronics & Information Technology, 2004, 26(12): 1996-2001.
Citation: Huang Zhen-jie, Hao Yan-hua, Wang Yu-min. Nominative Signature and Nominative Proxy Signature[J]. Journal of Electronics & Information Technology, 2004, 26(12): 1996-2001.

Nominative Signature and Nominative Proxy Signature

  • Received Date: 2003-06-24
  • Rev Recd Date: 2004-02-05
  • Publish Date: 2004-12-19
  • Analyses of a nominative signature scheme (KPW scheme) and a nominative proxy signature scheme (PL scheme) are given, respectively. The results show that the KPW scheme is not a nominative signature scheme since the nominator not only can verify and prove the validity of given signatures but also can convert given signatures into universally verifiable signatures, and that the PL scheme is only a self-authentication signature scheme since anyone can verify the validity of given signatures. Furthermore, an improvement of the KPW scheme, in which all properties of the nominative signature are held, and a nominative proxy signature scheme based on the proposed nominative signature scheme are proposed.
  • loading
  • Kim S J.[J].Park S J, Won D H. Nominative signatures. Proc. of ICEIC95, International Conference on Electronics, Information and Communications, Yanji, Jilin, China, August 7-1.1995,:-[2]Chaum D.[J].Antwcrpcn H. Undeniable signature. Proc. of Crypto89, LNCS 435, Berlin: SpringerVerlag.1989,:-[3]Chaum D. Zcro-knowledge undeniable signature. Proc. of Eurocrypt90, LNCS 473, Berlin:Springer-Vcrlag, 1990: 458-464.[4]Chaum D. Designated confirmcr signatures. Proc. of Eurocypt94, LNCS 950, Berlin: SpringerVerlag, 1994: 86-91.[5]Kim S J.[J].Park S J, Won D H. Zero-knowledge nominative signatures. Proc. of PragoCrypt96, International Conference on the Theory and Applications of Cryptology, Prague, Czech, September 30-October.1996,3:-[6]Park H U, Lee I Y. A digital nominative proxy signature scheme for mobile communication[J].Proc.of ICICS01, LNCS.2229, Berlin:-[7]Camenisch J. Efficient and generalized group signatures. Proc. of Eurocrypt97, LNCS1233,Berlin: Springer-Verlag, 1997: 465-479.[8]Schnorr C P. Efficient signature generation for smart cards. Journal of Cryptology, 1991, 4(3):161-174.[9]Lee B C, Kim H S, Kim K J. Strong proxy signature and its applications, SCIS01, the 2001 Symposium on Cryptography and Information Security. Oiso, Japan. January 2001: 603-608.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (2281) PDF downloads(569) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return