期刊文献+

基于椭圆曲线的代理盲签名方案 被引量:5

Proxy blind signature scheme based on elliptic curve
下载PDF
导出
摘要 利用多元线性变换来说明签名协议过程中各种变量之间的转化关系,提出了一种基于椭圆曲线的代理盲签名方案.作为特例,列举了4种ElGamal型签名相应的代理盲签名方案,并对所提出方案的安全性进行了分析.分析结果表明,通过选取不同的参数组合,可以得到不同的方案,从而使得代理盲签名方案具有较大的选择空间,可广泛应用于有匿名性要求的领域. Using the multi-linear transform formula to describe the conversion between various variables of the proxy signer and the message owner in signature protocol, a new proxy blind signature scheme based on an elliptic curve cryptosystem was proposed. As special examples, four proxy blind signature schemes based on ElGamal signature were listed, and the security of the proposed schemes was analyzed in details. By selection of different parameter sets of signature equation, different proxy blind signature schemes can be obtained, providing a wide range of parameter space to be selected. The proposed schemes can be applied to the field in which the anonymity is needed.
作者 赵泽茂
出处 《河海大学学报(自然科学版)》 CAS CSCD 北大核心 2006年第3期329-332,共4页 Journal of Hohai University(Natural Sciences)
关键词 盲签名 代理盲签名 椭圆曲线密码体制 blind signature proxy blind signature elliptic curve cryptosystem
  • 相关文献

参考文献6

  • 1MAMBO M.USUDA K,OKAMOTO E.Proxy signature for delegating signing operation[C]//Proc 3rd ACM Conference on Computer and Communication Security.New York:ACM Press,1996:48-57.
  • 2李继国,曹珍富,李建中,张亦辰.代理签名的现状与进展[J].通信学报,2003,24(10):114-124. 被引量:56
  • 3谭作文,刘卓军,唐春明.基于离散对数的代理盲签名(英文)[J].软件学报,2003,14(11):1931-1935. 被引量:91
  • 4LAI S,AWASTHI A K.Proxy blind signature scheme[J/OL].Cryptology ePrint Archive,2003,10(1):5-11[2003-07-02].http://eprint.iacr.org/2003/072/.
  • 5CHAUM D.Blind signature for untraceable payments.Advanced in Cryptologyt,Proc Crypto'82.Lecture Notes in Computer Science,Springer-Verlag,1983:199-203.
  • 6TAN Z,LIU Z,TANG C.Digital proxy blind signature schemes based on DLP and ECDLP.Beijing:Key Laboratory of Mathematics Mechanization Research,Academy of Mathematics and Systems Science,the Chinese of Academy of Sciences,2002:212-217.

二级参考文献59

  • 1李继国,曹珍富,张亦辰.Improvement of M-U-O and K-P-W proxy signature schemes[J].Journal of Harbin Institute of Technology(New Series),2002,9(2):145-148. 被引量:10
  • 2CHAUM D, EVERTSE J H, GRAFF J V. An improved protocol for demonstrating possession of discrete logarithms and some generalizations[A]. Proceedings of Eurocrypt'87 [C]. 1988. 127-141.
  • 3CHAUM D, EVERTSE J H, GRAFF J V, et al. Domonstrating possession of a discrete logarithm without levealing it[A]. Proceedings of Crypt'86 [C]. 1987. 200-212.
  • 4LANDFORD S. Weakness in some threshold cryptosystems [A]. Proc of Crypto'96 [C]. 1996. 74-82.
  • 5MAMBO M, USUDA If., OKAMOTO E. Proxy signatures for delegating signing operation[A]. Proc 3rd ACM Conference on Computer and Communications Security[C]. ACM Press, 1996. 48-57.
  • 6MAMBO M, USUDA K, OKAMOTO E. Proxy signatures: delegation of the power to sign messages[J]. IEICE Trans Fundam, 1996,E79-A (9): 1338-1354.
  • 7ZHANG IC Threshold proxy signature schemes[A]. 1997 Information Security Workshop[C]. Japan, 1997. 191-197.
  • 8SUN H M. LEE N Y. HWANG T. Threshold proxy signatures[J], IEE Proc Computers & Digital Techniques, 1999, 146(5): 259-263.
  • 9KIM S, PARK S, WON D. Proxy signatures, revisited [A]. Proc ICICS'97[C]. Int Conf on Information and Communications Seurity,LNCS, Springer-Verlag, 1997. 1334: 223-232.
  • 10SUN H M. An efficient nonrepudiable threshold proxy signature scheme with known signers[J]. Computer Communications, 1999,22(8): 717-722.

共引文献143

同被引文献41

  • 1ZhaoZemao LiuFengyu.CONSTRUCTION OF PROXY BLIND SIGNATURE SCHEME BASED ON MULTI-LINEAR TRANSFORM[J].Journal of Electronics(China),2004,21(6):505-510. 被引量:3
  • 2谷利泽,李中献,杨义先.不需要可信任方的匿名代理签名方案[J].北京邮电大学学报,2005,28(1):48-50. 被引量:24
  • 3李虓,何明星.可收回代理权的公平盲代理盲签名方案[J].计算机工程,2006,32(13):156-158. 被引量:1
  • 4夏满民,谷利泽.一种新型的代理盲签名方案[J].北京邮电大学学报,2006,29(3):48-52. 被引量:17
  • 5[1]Lin W D,Jan J K.A security personal learning tools using a proxy blind signature scheme[C]//Proc.of Int'l Conf.on Chinese Language Computing.2000.273-277.
  • 6[2]Tan Z W,Liu Z J,Tang CM.Digital proxy blind signature schemes based on DLP and ECDLP[J].MM Research Preprints,2002,21(7):212-217.
  • 7[3]Lai S,Awasthi A K.Proxy blind signature scheme[EB/OL].http://eprint.iacr.org/2003/072/.2003
  • 8[4]Wang Shaobin,Hong Fan and Cui Guohua.Secure efficient proxy blind signature schemes based on DLP[C]//Proc.of CEC'05,IEEE Computer Society.Washington,DC,USA,2005.pp.452-455.
  • 9Mambo M, Usuda K, Okamoto E. Proxy Signature: Delegation of the Power to Sign Messages[J]. IEICE Transactions on Fundamentals, 1996, E79-A(9): 1338-1353.
  • 10Lin W D, Jan J K. A Security Personal Learning Tools Using a Proxy Blind Signature Scheme[C] //Proceedings of ICCLC’00. Washington D. C., USA: IEEE Computer Society, 2000: 273-277.

引证文献5

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部