期刊文献+

Efficient ID-Based Proxy Blind Signature Scheme 被引量:2

Efficient ID-Based Proxy Blind Signature Scheme
下载PDF
导出
摘要 In a proxy blind signature scheme, the proxy signer is allowed to generate a blind signature on behalf of the original signer. The proxy blind signature scheme is useful in several applications such as e-voting and e-payment. In this paper, we propose an identity-based proxy blind signature scheme which combines the advantages of proxy signature and of blind signature. Our scheme fulfills peffecdy the security requirements of a proxy blind signature. Comparing the previous scheme, our scheme needs less computational overhead and is more efficient. In a proxy blind signature scheme, the proxy signer is allowed to generate a blind signature on behalf of the original signer. The proxy blind signature scheme is useful in several applications such as e-voting and e-payment. In this paper, we propose an identity-based proxy blind signature scheme which combines the advantages of proxy signature and of blind signature. Our scheme fulfills peffecdy the security requirements of a proxy blind signature. Comparing the previous scheme, our scheme needs less computational overhead and is more efficient.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期105-108,共4页 武汉大学学报(自然科学英文版)
基金 Supported by the Major Research Plan of the National Natural Science Foundation of China(90604023), the National Natural Science Foundation of China (60373059) and the National Research Foundation for the Doctoral Program of Higher Education of China(20040013007)
关键词 proxy signature blind signature IDENTITY-BASED bilinear pairings proxy signature blind signature identity-based bilinear pairings
  • 相关文献

参考文献8

  • 1Dong Z,Zheng H,Chen K F.ID-Based Proxy Blind Signa- ture[].Proceeding of the th International Conference on Advanced Information Networking and Application (AINA’ ).2004
  • 2Mambo M,Usuda K,Okamoto E.Proxy Signatures: Delega- tion of the Power to Sign Messages[].IEICE Transactions on Fundamentals.1996
  • 3Sunder L,Amit K A.Proxy Blind Signature Scheme. http: // eprint. iacr. org /2003 /072 . 2003
  • 4Chaum D.Blind Signature for Untraceable Payments[].Advances in Cryptology-Crypto’.1983
  • 5Tan Z W,Liu Z J,Tang C M.Digital Proxy Blind Signature Schemes Based on DLP and ECDLP[].MM Research Pre- prints.2002
  • 6Chaum D.Blind Signature System[].Advances in Cryp- tology-Crypto’.1983
  • 7Zhang K.Threshold Proxy Signature Schemes[].Proceeding of the Information Security Workshop.1997
  • 8Sun H M,Hsieh B T.Remarks on Two Non-Repudiable Proxy Signature Schemes[].Proceeding of the th Na- tional Conference on Information Security.1999

同被引文献19

  • 1Chen Xiaofeng,Zhang Fangguo,Kwangjo Kim.NEW ID-BASED GROUP SIGNATURE FROM PAIRINGS[J].Journal of Electronics(China),2006,23(6):892-900. 被引量:8
  • 2ZHANG Jianhong1,2 , ZOU Wei3 1. College of Science, North China University of Technology, Beijing 100041,China,2. Institute of Software of Chinese Academy of Sciences /State Key Laboratory of Information Security, Beijing 100080, China,3. Institute of Computer Science and Technology, Peking University, Beijing 100871, China.Another ID-Based Proxy Signature Scheme and Its Extension[J].Wuhan University Journal of Natural Sciences,2007,12(1):33-36. 被引量:3
  • 3Chaum D. Blind signatures for untraceable payments[C]// Proc of Advances in Cryptology, 1983:199-203.
  • 4Mambo M, Usuda K, Okamoto E. Proxy signatures: Delega tion of the power to sign messages[J]. IEICE Transactions on Fundamentals of Electronics, Communications and Com- puter Sciences,1996,79(9) :1338 1354.
  • 5Lin W D,Jan J K. A security personal learning tools using a proxy blind signature scheme[C] //Proc of International Conference on Chinese Language Computing,2000:273-277.
  • 6Tan Z. An off-line electronic cash scheme based on proxy blind signatureEJ ]. The Computer Journal, 2011,54 (4) : 505- 512.
  • 7Su J, Liu J. A proxy blind signature scheme based on DLP [C: //Proc of 2010 International Conference on Internet Technology and Applications, 2010 : 1-4.
  • 8Gu C,Zhu Y. An efficient ID-based proxy signature scheme from pairings[C]//Proc of Information Security and Cryptol- ogy,2008:40-50.
  • 9Zhang B,Xu Q. Certificateless proxy blind signature scheme from bilinear pairings:C://Proc of the 2nd International Workshop on Knowledge Discovery and Data Mining, 2009: 573-576.
  • 10Yu Y,Mu Y,Wang G,et al. Cryptanalysis of an off-line elec- tronic cash scheme based on proxy blind signature[J]. The Computer Journal,2011,54(10) :1645-1651.

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部