期刊文献+

盲签名及其在电子商务中的应用

Blind signature scheme in electronic business
下载PDF
导出
摘要 电子商务正在成为一种重要的商务发展模式,它的安全性是通过以密码学为基础的技术和协议来保障的。盲签名技术由于其所具有的匿名性、不可伪造性等特性而应用于电子商务的诸多领域,起着越来越重要的作用。本文围绕盲签名的概念展开,首先给出了盲签名的一般模式,然后在此基础上分别阐述强盲签名、弱盲签名、代理盲签名和部分盲签名等主要的盲签名方案,并讨论它们在电子商务中的应用领域,最后给出了它在电子商务中的两个较成熟的应用——电子现金和电子投票。 Electronic business is turning to an important business pattern. Its security is based on the cryptology technology and protocols. Blind signature can provide anonymity, unforgery within the security. With the developing of electronic business, blind signature technology is playing a more and more important role in this field. This paper focuses on the blind signature scheme. First, a general protocol is described. Then, the main schemas of blind signature are illuminated, such as strong blind signature, week blind signature, partial blind signature and proxy blind signature. We also analyze their application field in electronic business. Finally, we explain its application in e-cash and e-voting, the most mature fields by now.
出处 《浙江工业大学学报》 CAS 2004年第4期397-402,共6页 Journal of Zhejiang University of Technology
关键词 盲签名 电子商务 电子现金 电子投票 blind signature E-cash E-voting
  • 相关文献

参考文献14

二级参考文献38

  • 1祁明,肖国镇.加强广义El Gamal型签名方案的安全性[J].电子学报,1996,24(11):68-72. 被引量:10
  • 2祁明.数字签名及其在信息安全协议中的应用:博士论文[M].西安:西安电子科技大学,1996..
  • 3[1] CHAUM D, FIAT A ,NAOR M. Untraceable electronic cash,advances in cryptology-crypto88[A].
  • 4[2] D'AMINGO S, DI CRESCENZO G.Methodology for digital money based on general cryptographic
  • 5[3] OKAMOTO T, OHTA K. One-time zero-knowledge authentications an d their applications to untraceable electronic cash[J].IEICE Trans,1998,E81- A(1):2-10.
  • 6[1]Schneier B. Applied cryptography: protocols, algorith ms, and source in C[M]. John Wiley & Sons, New York, 1993
  • 7[2]David Chaum. Blind signature for untraceable payments [C]. In R. L. Rivest, A. Sherman, and D. Chaum, editors, Proc. CRYPTO 82. 199~203, New York, 1983. Plenum Press.
  • 8[3]Jan Camenisch, Ueli Maurer, Markus Stadler. Digital p ayment systems with passive anonymity-revoking trustees[C]. Journal of Comput er Security, 1997, 5(1): 69~89
  • 9[4]Laurie Law, Susan Sabett, Jerry Solinas. How to made a mint: the cryptography of anonymous electronic cash[J]. National Security Ag ency, Office of Information Security Research and Technology, Cryptology Divisio n, June 1996.
  • 10[5]Ronald L.Rivest, Adi Shamir, Leonard M. Adleman. A me thod for obtaining digital signatures and public-key cryptosystems[J]. Commun ications of the ACM, 1978, 21(2): 120~126

共引文献91

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部