期刊文献+

A New Efficient Blind Signcryption 被引量:2

A New Efficient Blind Signcryption
原文传递
导出
摘要 In a blind signcryption, besides the functions of digital signature and encryption algorithm for authentication and confidentiality, a user can delegates another user's capability with the anonymity of the participants guaranteed. Some blind signcryptions were proposed but without a blind signcryption with public public verifiability. In this paper, verifiability that is proved to be efficient and secure is proposed. Through the security analysis, we proved that the scheme can offer confidentiality, integrity, unforgeability, non-repudiation and public verifiability. The coming research direction is also summarized. In a blind signcryption, besides the functions of digital signature and encryption algorithm for authentication and confidentiality, a user can delegates another user's capability with the anonymity of the participants guaranteed. Some blind signcryptions were proposed but without a blind signcryption with public public verifiability. In this paper, verifiability that is proved to be efficient and secure is proposed. Through the security analysis, we proved that the scheme can offer confidentiality, integrity, unforgeability, non-repudiation and public verifiability. The coming research direction is also summarized.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2008年第6期662-664,共3页 武汉大学学报(自然科学英文版)
基金 Supported by the Ministry of Railways Foundation of Science and Technology Development (2007X001-E)
关键词 ANONYMITY blind signcryption public verifiability anonymity blind signcryption public verifiability
  • 相关文献

参考文献10

  • 1Zheng Yuliang.Digital Signcryption or How to Achieve Cost (Signature + Encryption) Cost(Signature)+Cost (Encryp- tion)[].Advances in Cryptology CRYPTO’.1997
  • 2David C,Amos F,Moni N.Untraceable Electronic Cash[].Proceedings of Crypto’.1988
  • 3Amit K A,Sunder L.An Efficient Scheme for Sensitive Message Transmission Using Blind Signcryption. http://arxiv.org/abs/cs.CR/0504095 . 2007
  • 4Y. Zheng.Signcrypton and its applications in efficient public key solutions[].Proceedings of Information Security Work-shop(ISW‘).1998
  • 5CHAUM D.Blind signatures for untraceable payments[].Advances in Cryptology Crypto.1982
  • 6Camenisch L J,Piveteau M J,Stadler A M.Blind Signatures Based on the Discrete Logarithm problem[].Advances in Cryptology‘.1995
  • 7CHAUM D.Blind signature systems[].Proceedings of the Crypto’.1998
  • 8TAN Z W,LIU Z J,TANG C M.A proxy b lind signa-ture schem e based on DLP[].Journal of Software.2003
  • 9Rivest,R.,Shamir,A.,Tauman,Y.How to leak a secret[].Proceedings of Asiacrypt.2001
  • 10Fangguo Zhang,Kwangjo Kim.ID-Based blind signature and ring signature from pairings[].Asiacrypt’ LNCS Berlin Heidelberg Springer-Verla.2002

同被引文献5

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部