期刊文献+

基于双线性对的代理盲签名 被引量:2

A Proxy Blind Signature Scheme Based on Bilinear Pairing
下载PDF
导出
摘要 代理签名让原始签名者可以将其数字签名权力委托给代理签名者,使其能够代理原始签名者签发指定的数字消息;盲签名使用户能将给定的消息让别人签发,而又不泄漏任何有关的信息给签名者。文中结合两者的优点,利用基于椭圆曲线上的Weil配对的双线性映射,构造了一个基于双线性对的代理盲签名方案,并对其安全性进行了分析。 Proxy signature allows an original signer to delegate Iris/her signing capability to a proxy signer such thai the proxy signer can sign mcssages on behalf of the original signer. Blind signature allows a user to have a Riven mesage signed by the signer without revealing any information about the message ,Based on bilinear projection of well pairing,a proxy blind signature seheme is presented,which satisfies the security properties of both proxy signature scheme and blind signature scheme. A simple seeurity analysis of the newly proposed scheme is also given.
作者 蔡庆华
出处 《计算机技术与发展》 2006年第11期166-167,190,共3页 Computer Technology and Development
基金 安徽省教育厅自然科学研究项目(2005KJ365zc)
关键词 双线性映射 WEIL配对 代理签名 盲签名 bilinear paring well pairing proxy signature blind signature
  • 相关文献

参考文献5

  • 1Mambo M,Usuda K,Okamoto E.Proxy Signature for Delegating Signing[C]//In Proc 3rd ACM Conference on Computer and Communications Security.New Delhi,India,New York:ACM Press,1996.
  • 2Chaum D.Blind signature systems[C] // Proceedings of the Crypto 83.New York:Springer-Verlag,1998:153-156.
  • 3Bonch D,Lynn B,Shacham H.Short signatures from the Weil pairing[C]// In:Advances in Cryptology-Asiacrypr 2001,Lecture Notes in Computer Science 2248.Heidelberg:Springer,2002:514-532.
  • 4马春波,何大可.基于双线性映射的卡梅隆门限签名方案[J].计算机研究与发展,2005,42(8):1427-1430. 被引量:8
  • 5李素娟.一种基于身份的代理盲签名[J].南京工业大学学报(自然科学版),2005,27(3):107-110. 被引量:2

二级参考文献17

  • 1Chaum D. Blind signature systems[A].Proceedings of the Cryp to 83[C].New York:Springer-Verlag,1998.153-156.
  • 2Mambo M, Usuda K, Okamoto E. Proxy signatures for delegating signing operation[A].Proceedings of the 3rd ACM Conference on Computer and communications Security[C].New Delhi:ACM Press,1996.48-57.
  • 3Silveman J H.The arithmetic of elliptic curves[M].New York:Springer-Verlag,1986.96-99.
  • 4Boneh D, Franklin M.Identity-based encryption from the weil pairing[A].Advance in Cryptology-CRYPTO 2001[C].New York: Springer-Verlag,2001.341-346.
  • 5Paterson K. ID-based signatures from pairing On elliptic curves[ EB/OL].http://epring.iacr.org.2002-10-01.
  • 6Hess F. Esponent group signature schemes and efficient identity based signature schemes based on pairing[EB/OL].http://epfint.iacr. org,2004-10-11.
  • 7Hess F, Seroussi G, Smart N.Two topics in hyperelliptic cryptography[A].SAC2001[C].New York:Springer-Berlag,2001,181-189.
  • 8Zhang F, Kim K. ID-based blind signature and ring signature from pairings[A].Advances in Cryptology-Asiacrypt 2002[C].New York: Springer-Verlag,2002.533-547.
  • 9H. Krawezyk, T. Rabin. Chameleon signatures. In: Proc.NDSS2000. Dan Diego: IEEE Computer Society Press, 2000.143-154.
  • 10F. G. Zhang, R. SMavi-Naini, W. Susilo. ID-based Chameleon hashes from bilinear pairings, http://eprint.iacr.org/2003/208.2003-09-29/2004-04-28.

共引文献8

同被引文献23

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部