期刊文献+

一种具有有效授权期的盲代理签名方案

An Anonymity Blind Proxy Signature Scheme with Finite Warrant Period
下载PDF
导出
摘要 综合考虑了原始签名人和代理签名人的利益,通过将部分盲签名技术引入代理签名,对文献[3]提出的一种匿名代理签名方案进行了改进,构造出在合理安全假设可证安全的新匿名代理协议。其特点在授权证书中包含授权有效期,与以往方案相比,减少了系统数据库的存储量,提高了系统检索和执行效率。 In this paper, according to the benefit of the original signer and the signer, by using partially blind signature, the proxy signature scheme is improved. And it also proposes a new proxy signature scheme with finite warrant period. The storage of the system database is reduced, and the efficiency of search and execution are achieved as opposite to the other proposed schemes.
出处 《计算机工程》 CAS CSCD 北大核心 2006年第12期5-7,共3页 Computer Engineering
基金 湖南省自然科学基金资助项目(03JJY6017) 湖南省教育厅基金资助项目(03c327)
关键词 盲代理签名 部分盲签名 授权有效期 Blind proxy signature Partial blind signature Finite warrant period
  • 相关文献

参考文献7

  • 1Mambo M,Usuda K,Okamoto E.Proxy Signature:Delegation to Sign Messages[J].IEICE Transactions on Fundatamentals,1996,E79-A(9):1338-1354.
  • 2Shum K,Wei V K.A Strong Proxy Signature Scheme with Proxy Signer Privacy Protection[C].Proc.of the 11th IEEE Int'l Workshops on Enabling Technologies:Infrastructure for Collaborative Enterprises,New York,2002:55-56.
  • 3吴铤,于秀源,陈勤,谢琪.匿名代理的理想实现[J].计算机研究与发展,2004,41(4):710-714. 被引量:6
  • 4王晓明,符方伟.可撤销匿名性的盲代理签名方案[J].计算机学报,2003,26(1):51-54. 被引量:23
  • 5Abe M,Fjisaki E.How to Date Blind Signatures[C].In Advances in Cryptology Asiacrypt 96.Springer-Verlag,1996:244-251.
  • 6Brand S.Untraceable Off-line Electronic Cash in Wallet with Observers[C].In Advances in Cryptology Crypto93.Springer-Verlag,1994:302-318.
  • 7Frankel Y,Siounis T Y,Yung M.Fair Off-line E-cash Made Easy[C].In Advances in Cryptology Asiacrypt98.Springer-Verlag,1998:257-270.

二级参考文献13

  • 1[1]Mambo M, Usuda K, Okamoto E. Proxy signature: Delegation to sign messages. IEICE Transactions on Fundamentals, 1996,E79-A (9): 1338~1354
  • 2[2]Kim S, Park S, Won D. Proxy signatures, revisited. In: Lecture Notes in Computer Science 1334, Berlin: Springer-Verlag, 1997, 1334:223~232
  • 3[3]Zhang K. Threshold proxy signature scheme. In:Proceedings of Information Security Workshop, Japan, 1977. 101 ~ 109
  • 4[4]Yi L J, Bai G Q, Xiao G Z. Proxy multi-signature scheme: A new type of proxy signature scherne. Electronics Letters, 2000,36(6) :527~528
  • 5[1]V Varadharajan, P Allen, S Black. An analysis of the proxy problem in distributed systems. In: T F Lunt, J Mclean eds. Proc of IEEE Computer Society Symp on Security and Privacy 1991. New York: IEEE Press, 1991. 255~275
  • 6[2]M Mambo, K Usuda, E Okamoto. Proxy Signature: Delegation of the power to sign messages. IEICE Trans on Fundam, 1996, E79-A (9): 1338~1354
  • 7[3]K Zhang. Threshold proxy signature schemes. In: Proc of the 1st Int'l Information Security Workshop (ISW'97), LNCS 1396. Berlin: Springer-Verlag, 1997. 191~197
  • 8[5]K Shum, V K Wei. A strong proxy signature scheme with proxy signer privacy protection. In: N Shahmehri ed. Proc of the 11th IEEE Int'l Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE'02). New York: IEEE Press, 2002. 55~56
  • 9[6]S Brands. Untraceable off-line cash in wallets with observers. In: Advanced in Cryptology-Crypto'93, LNCS 773. Berlin: Springer-Verlag, 1993. 302~318
  • 10[7]S Brands. An efficient off-line electronic cash system based on the representation problem. Centrum voor Wiskunde en Informatica, Tech Rep: CS-R9323, 1993

共引文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部