期刊文献+

一个新的基于身份的盲签名方案

A new Identity-based Blind Signature Scheme
下载PDF
导出
摘要 盲签名使得用户可以得到签名人的签名而不让签名人知道具体被签的消息是什么,它在诸如电子现金、电子拍卖、电子选举等场合具有广泛的应用。本文给出了一个新的基于身份的盲签名方案,该签名方案的安全性是基于CDH问题。 Blind signature allows the user to get a signature on some message without letting the signer know the concrete content of the signed message,which has extensive application occasions,such as electronic cash,electronic auction,electronic voting,and so on.In this paper,we present a new identity-based blind signature scheme,the security of which is based on the CDH problem.
作者 林敬仁
出处 《上海商学院学报》 2007年第4期24-25,共2页 Business Economic Review
关键词 数字签名 基于身份 盲签名 Digital Signatures Identity-based Blind Signature
  • 相关文献

参考文献10

  • 1[1]Chaum D.Blind signature for untraceable payments[A].Advances in CryptologyCrypto'82[C].New York:Prenum Publishing Corporation,1982 199-203.
  • 2[2]Gutmann P.PKI:It's not dead,just resting[J].IEEE Computer,2002,35(8):41-49.
  • 3[3]Shamir A.Identity-base cryptosystems and signature schemes[A].Advances in Cryptology proceeding of Crypto 1984,Lecture Notes in Computer Science:Vol 196[C].Berlin:Springer-Verlag,1984:47-53.
  • 4[4]Zhang F,Kim K.ID-based blind signature and ring signature from pairings[A].Advances in Cryptology-Asiacrypt2002[C].New York:Springer-Verlag,2002.533-547.
  • 5[5]Zhang F,Kim K.Efficient ID-based Blind Signature And Proxy Signature from Bilinear pairings[A].Advances in ACISP 2003[C].Berlin:Springer-Verlag,2003.312-323.
  • 6[6]Huang z,Chen K,Wang Y,Efficient Identity-Based Signatures and Blind Signatures[A].Advances in CANS 2005[C].Berlin:Springer-Verlag,2005.120-133.
  • 7卢家凰,赵泽茂.一种新型的基于ID的盲签名[J].计算机工程与设计,2006,27(7):1227-1229. 被引量:2
  • 8李萍,张建中,魏峰.一种基于身份的代理盲签名方案[J].微电子学与计算机,2006,23(2):52-54. 被引量:11
  • 9[9]LiR,Yu J,Li G and D.A New Identity-Based Blind Signature Scheme with Batch Verifications[A].Advances in MUE2007[C].Korean,2007.1051-1056.
  • 10[10]Pointcheval D,Stem J.Security arguments for digital signatures and blind signatures[J].Journal of Cryptology,2000(13).

二级参考文献13

  • 1A Shamir. Identity-Based Cryptosystems and Signature Schemes[C]. In: Proc Crypto 1984, LNCS, Springer-verlag,1985, 196:47-53.
  • 2http://venona.antioffine.com.
  • 3D Boneh, M Franklin. Identity-Based Encryption from the Well pairing [C]. In: Proc Crypto 2001, LNCS, Springer-Verlag, 2001, (2139): 213-229.
  • 4F Hess. Efficient Identity Based Signature Schemes Based on Pairings, SAC 2002, LNCS Springer-Verlag, 2002,(2595): 310-320.
  • 5WenboMao.Modern Cryptography:Theory and Practice[M].电子工业出版社,2004.7.
  • 6Shamir A.Identity-based cryptosystems and signature schemes[A].Advances in cryptology-crypto'84[C].LNCS 0193,47-53,Springer-Verlag,1984.
  • 7Boneh D,Franklin M.Identity-based encryption from the weil pairing[A].Advances in cryptology-crypto'2001[C].LNCS 2139,213 -229,Springer-Verlag,2001.
  • 8Hess F.Exponent group signature schemes and efficient identity based signature schemes based on pairings[R].Cryptologye Print Archive,2002.
  • 9Zhang Fangguo,Kim Kwangjo.ID-based blind signature and ring signature from pairings[A].Proc of Asiacrpt[C].2002LNCS,533-54 7,Springer-Verlag,2002.
  • 10Chaum D.Blind signatures for untraceable payments[A].Advances in cryptology-crypto'82[C].Plenum,NY,199-203,1983.

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部