期刊文献+

改进的基于身份的盲签名 被引量:2

Improvement of identity_based blind signature
下载PDF
导出
摘要 盲签名是一种可以确保消息者传送的匿名性的签名。在盲签名中签名者在签名时和签名后都不能将自己在签名协议中的签名和签名的消息联系起来,这就是所谓的不可追踪性,但是文献[1]中的基于身份的盲签名方案不具有不可追踪性,给出一种得到盲签名和签名的消息联系起来的一种攻击方法。针对以上分析的弱点,提出一种改进的基于身份的盲签名方案,并且对它的安全性和不可追踪性进行分析。 A blind signature scheme can ensure anonymity of the sender of a message. The signature cannot link a signature to the corresponding message of signing protocol at the same time and after signing, which is called unlinkability, But It is pointed out the identity_ based blind signature scheme in document can not satisfy unlinkability property, and an attack is put forward which identifies the association between the message and the blind signature signer generated. An improvement is proposed to solve the problem, and its security and unlinkability are also analyzed.
出处 《计算机工程与设计》 CSCD 北大核心 2006年第21期4123-4124,共2页 Computer Engineering and Design
关键词 盲签名 基于身份 不可追踪性 双线性配对 攻击 改进 blind signature identity_based unlinkability bilinearpairing attack improvement
  • 相关文献

参考文献8

  • 1王泽成,斯桃枝,李志斌,周振江.基于身份的代理签名和盲签名[J].计算机工程与应用,2003,39(23):148-150. 被引量:13
  • 2Chaum D.Blind signature for untraceable payments[C].Advance in Cryptology,Proc Crypto'82,Lecture Notes in Computer Science,Springer Verlag,1983.199-203.
  • 3Bonech D,Lynn B,Shacham H.Short signature from the Weil pairing[C].Berlin:Proceedings of Advance in Cryptology ASIA Crypt,LNCS2248,Springer Verlag,2001.514-532.
  • 4Hess F.Exponent group signature schemes and efficient identity based signature schemes based on pairing[C].Proc 9th Workshop on Selected Areas in Cryptography-SAC,LANCS 2595,Springer Verlag,2002.310-3 2 4.
  • 5Chen J J-R,Chen A P.A blind signature scheme base on dual complexities[C].Shanghai,PRC:Proceedings of the International Conference on Information Security,2002.61-65.
  • 6Huang H F,Chang C C.A new design of efficient partially blind signature scheme[J].The Journal of Systems and Software,2004,73(3):397-403.
  • 7Paterson K G.ID-based signature from pairings on elliptic curves[J].Electron Lett,2002,38(18):1025-1026.
  • 8Zhang F G,Safavi_Naini R,Susilo W.Efficient verifiably encrypted signature and partially blind signature from bilinear pairings[C].New York:Proceeding of the Indocrypt,LNCS 2904,Spinger Verlag,2003.191-204.

二级参考文献9

  • 1A Shamir.Identity-based cryptosystems and signature schemes[C].In: Proc Crypto 1984, LNCS ,Springer-Verlag, 1985 ; 196:47-53.
  • 2J H Silverman.The Arithmetic of Elliptic Curves[J].Graduate Texts in Mathematic, Springer-Verlag, 1986; 106:96-99.
  • 3D Boneh,M Franklin.Identity-Based Encryption from the Well pairing[C].In:Proc Crypto 2001 ,LNCS,Springer-Verlag,2001 ;2139:213-229.
  • 4F Hess.Exponent group signature schemes and efficient identity based signature schemes based on pairing.Available from http://eprint.iacr. org,2002.
  • 5K Paterson.ID-based signatures from pairing on elliptic curves.Available from http://epring.iacr.org,2002.
  • 6P S E M Barreto,H Y Kim.Efllcient algorithms for pairing-based cryptosystems.Available from http://eprint.iacr.org/,2002.
  • 7S D Galbraith.Supersingular curves in cryptography[C].In:Proc Asia-Crypt 2001 ,LNCS,Springer-Verlag,2001 ;2248:495-513.
  • 8BSchneier著 吴世忠译.应用密码学[M].机械工业出版社,2000.58-59.
  • 9冯登国 裴定一.密码学导引[M].北京:科学出版社,2001..

共引文献12

同被引文献21

  • 1张学军,王育民.高效的基于身份的部分盲签名[J].计算机工程与应用,2007,43(11):211-212. 被引量:11
  • 2刘亚丽,刘玉龙,唐蕾.具有前向安全特性的盲签名方案[J].徐州师范大学学报(自然科学版),2007,25(2):50-54. 被引量:2
  • 3David Chaum.Blind signature for untraceable payments[C],Advances in Cryptology-Crypto'82 Proceeding,LNCS,Plenum NewYork 1983,199-203.
  • 40kamoto T.Provable secure and practical identification schemes and corresponding signature re schemes[C].LNCS Vol.740,Proceedings of the 12th Annual International Cryptology Co nference on Advances in Cryptology,.Springer-Verlag,London,UK,1992:31-53.
  • 5Adi shamire.Identity-based cryptosystems and signature schemes[C].Proceedings of CRYPTO 84 on Advances in cryptology.Springer-Verlag,New York:1985 47-53.
  • 6Fangguo Zhang,Kwangjo Kim.ID-based blind signature and ring signature from pairings[C].Proceedings of the 8th International Conference on the Theory and Application of Cry-ptology and Information Security:Advances in Cryptology,LNCS Vol.2501.Springer-Ver-lag,London,UK 2002:533-547.
  • 7Fangguo Zhang.Kwangjo Kim.Efficient ID-based blind signature and proxy signature from bilinear parings[C].ACISP 2003,LNCS Vol.2727.Springer-Verlag.2003:312-323.
  • 8Chow S S M,Hui L C K,Yiu H S M,et al.Two improved partially blind signature schemes from bilinear pairings.http://eprint.iacr.org/2004/108.pdf.
  • 9Ross Anderson.Two remarks on public key cryptology[C].Manuscript,2000,and Invited Lecture at the Fourth Annual Conference on Computer and Communications Security.1997.
  • 10闫东升.一个新的高效的基于身份的部分盲签名方案[J].计算机工程与应用,2008,44(2):137-139. 被引量:16

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部