[1]王琪,缪祥华.一种数字签名私钥丢失后的安全保障方案[J].计算机技术与发展,2013,(02):250-253.
 WANG Qi,MIAO Xiang-hua.A Security Scheme of Solving Digital Signature Private Key Lost Situation[J].,2013,(02):250-253.
点击复制

一种数字签名私钥丢失后的安全保障方案
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2013年02期
页码:
250-253
栏目:
安全与防范
出版日期:
1900-01-01

文章信息/Info

Title:
A Security Scheme of Solving Digital Signature Private Key Lost Situation
文章编号:
1673-629X(2013)02-0250-04
作者:
王琪缪祥华
昆明理工大学 信息工程与自动化学院
Author(s):
WANG QiMIAO Xiang-hua
关键词:
数字签名私钥丢失可信性
Keywords:
digital signatureprivate keylostverification
文献标志码:
A
摘要:
数字签名方案的安全性依赖于签名者私钥的安全性,当签名者的私钥泄露后,使用该私钥产生的所有签名都变得不可信.新方案引入了一个时间参数T,以及一个可信的第三方,解决了签名者私钥丢失之前所签消息的可信性问题.提出让签名者维护一份签名记录表,并且第三方也维护一份签名记录表,然后定期比较这两份签名记录,可以使得签名者能够及时地发现私钥丢失.分析表明,新方案可以及时地发现私钥的丢失,并且当签名者私钥丢失之后,依然可以保证该私钥丢失之前所产生签名的有效性,是一个安全可行的数字签名方案
Abstract:
The digital signature security relies on the security of the signer's private key,if the private key leaks out,all of the signatures from the private key will completely lost their credibility. A new scheme is proposed which adds a time parameter T and a trustworthy third-party in order to solve the problem of verification of the signature before the lost of the private key. It is suggested that the signer maintains a signature form,and a third-party also maintains one,and then periodically compare the two signature records,can make signer timely find lost private key. Analysis shows that,the new scheme can timely find the loss of the private key,and after the signer loses pri-vate key,still can guarantee the effectiveness of signature generated by private key before lost,is a safe and feasible digital signature scheme

相似文献/References:

[1]刘华春.基于PKI的网上证券交易系统的构建[J].计算机技术与发展,2009,(07):173.
 LIU Hua-chun.Implementing a System of On - line Securities Trading Based on PKI Technology[J].,2009,(02):173.
[2]王平水 赵俊杰.多用户环境中签名方案的安全性研究[J].计算机技术与发展,2009,(01):157.
 WANG Ping-shui,ZHAO Jun-jie.Research on Security of Multi - User Setting Signature Schemes[J].,2009,(02):157.
[3]邓晓军.PKI技术及其应用的分析[J].计算机技术与发展,2008,(06):144.
 DENG Xiao-jun.Analysis of PKI Technology and Its Application[J].,2008,(02):144.
[4]刘辉 李子臣.基于圆锥曲线的数字签名和Schnorr盲签名[J].计算机技术与发展,2008,(07):133.
 LIU Hui,LI Zi-chen.Digital Signature and Schnorr Blind Signature Based on Conic Curves[J].,2008,(02):133.
[5]赵青 唐英敏.数字签名在OpenType字库中的分析研究[J].计算机技术与发展,2008,(08):20.
 ZHAO Qing,TANG Ying-min.Analysis and Research of Digital Signature in OpenType Font[J].,2008,(02):20.
[6]黄滨 周德俭 卫传征.基于SAML的新型单点登陆模型研究[J].计算机技术与发展,2008,(09):219.
 HUANG Bin,ZHOU De-jian,WEI Chuan-zheng.Research of New Single Sign- on Model Based on SAML[J].,2008,(02):219.
[7]王平水.零知识数字签名方案中Hash值长度的研究[J].计算机技术与发展,2007,(06):170.
 WANG Ping-shui.Study on Length of Hash - Values for Digital Signature Schemes Based on Zero- Knowledge[J].,2007,(02):170.
[8]梁雨平 汤小华.一种前向安全性的可证实代理数字签名方案[J].计算机技术与发展,2007,(07):142.
 LIANG Yu-ping,TANG Xiao-hua.A Certifiable Representative Digital Signature Approach Based on Forward Security[J].,2007,(02):142.
[9]刘涛 潘道远.校园网络环境下数字签名的研究与设计[J].计算机技术与发展,2007,(12):128.
 LIU Tao,PAN Dao-yuan.Research and Design of Digital Signature Based on Campus Network Environment[J].,2007,(02):128.
[10]蔡庆华.一个基于椭圆曲线的前向安全的签密方案[J].计算机技术与发展,2007,(12):132.
 CAI Qing-hua.A Signcryption Scheme with Forward Security Based on ECC[J].,2007,(02):132.

更新日期/Last Update: 1900-01-01