期刊文献+

基于可信平台模(TPCM)的盲签名方案

Blind signature scheme based on trusted platform computation module
下载PDF
导出
摘要 针对基于身份的盲签名过程中PKG密钥泄露问题,提出了基于可信平台控制模块的盲签名方案,该方案中签名信息对签名者不可见,无法追踪签名信息。盲签名方案采用可信的秘密共享分配中心(SDC,share distribution center)和TPCM合作生成用户的签名密钥,不单独产生用户私有密钥,解决了用户的密钥托管问题,可以有效地防止用户的密钥泄露,保护了用户的匿名性和签名的不可追踪。最后在随机语言机模型下证明了该方案的安全性,与传统的盲签名方案对比,本方案计算效率较高。 For the key leak problem in identity-based blind signature, a blind signature scheme based on the trusted platform control module(TPCM) was presented. The message which will be signed is unknown to the signer, and the information of the signature cannot be tracked. In the blind signature scheme, the secret share distribution center and the TPCM cooperate to generate the user's signature key, and the user's private key is not alone to be produced. So it solves the key escrow problem, and can also be effective to prevent disclosure of the user's key and protect the user's anonymity and the no track of the signature. Finally random oracle was used to prove the security of the scheme. Compared with the traditional scheme, the proposed scheme has better computational efficiency.
出处 《通信学报》 EI CSCD 北大核心 2013年第S1期101-105,共5页 Journal on Communications
基金 国家高技术研究发展计划("863"计划)基金资助项目(2013AA011102) 国家自然科学基金资助项目(61001091 61271118)~~
关键词 盲签名 双线性映射 SDC 随机预言机 blind signature bilinear map SDC random oracle
  • 相关文献

参考文献3

  • 1陆洪文,郑卓.基于双线性对的门限部分盲签名方案[J].计算机应用,2005,25(9):2057-2059. 被引量:8
  • 2Bessie C. Hu,Duncan S. Wong,Zhenfeng Zhang,Xiaotie Deng.Certificateless signature: a new security model and an improved generic construction[J].Designs Codes and Cryptography.2007(2)
  • 3Xiaofeng Chen,Fangguo Zhang,Shengli Liu.ID-based restrictive partially blind signatures and applications[J].The Journal of Systems & Software.2006(2)

二级参考文献9

  • 1JUANG WS, LEI CL. A Secure and Practical Electronic Voting Scheme for Real World Environments[J]. IEICE Transactions on Fundamentals, 1997, E80-A(1): 64 -71.
  • 2JUANG WS, LEI CL. Blind threshold signature based on discrete logarithm[A]. Proceedings of the 2nd Asian Computing Science Conference, Lecture Notes in Computer Science[C], Springer-Ver-lag, 1996.1179.172 -181.
  • 3ZHANG F, KIM K. Efficient ID-Based blind signature and proxy signature from bilinear parings[A]. Proc of ACISP'03[C]. Wollongong, Australia, LNCS 2727, Berlin: Springer-Verlag, 2003. 312- 323.
  • 4Shamir A. How to Share a Secret[J]. Communication of ACM,1979, 22(11): 612 - 613.
  • 5王育民 肖国镇.密码学与数据安全[M].北京:国防工业出版社,1991.211-215.
  • 6BARRETO P, KIM H, LYNN B, et al. Efficient Algorithems for Pairing-Based Cryptosystems[A]. CRYPTO 2002[C]. Springer-Ver-lag, 2002, LNCS 2442.354 - 368.
  • 7CHOW SSM, HUI LCK, YIU SM, et al. Two Improved Partially Blind Signature Schemes From Bilinear Pairings[J/OL]. Cryptology ePrint Archive: Report, 2004. 108.
  • 8VO DL, ZHANG FG, KIM K. A New Threshold Blind Signature Scheme From Pairings[A]. SCIS2003[C]. Itaya, Japan, 2003, vol 1/2.233 - 238.
  • 9钱海峰,曹珍富,薛庆水.基于双线性对的新型门限代理签名方案[J].中国科学(E辑),2004,34(6):711-720. 被引量:22

共引文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部