期刊文献+

基于双线性对的新型代理盲签名方案 被引量:3

New Proxy Blind Signature Scheme Based on Bilinear Pairings
下载PDF
导出
摘要 针对目前已提出的代理盲签名方案中存在的安全性缺陷,提出了一个基于双线性对的新型代理盲签名方案,并对所提方案进行了安全性分析。新方案满足代理盲签名的全部安全性要求,并且具有通信量小、计算复杂性低等优点。 A newproxy blind signature scheme based on bilinear pairings is gived because those proposed proxy blind signature schemes have secure leak. This paper analyzes its security and efficiency. The new scheme satisfies all the security requirement of proxy blind signature, and has the merits of little communication and low computation complexity, etc.
出处 《计算机应用研究》 CSCD 北大核心 2007年第2期130-131,150,共3页 Application Research of Computers
基金 国家自然科学基金资助项目(10271069) 陕西省自然科学基金资助项目(2004A14)
关键词 代理盲签名 双线性对 盲性 不可链接性 Proxy Blind Signature Bilinear Pairings Blindness Unlinkability
  • 相关文献

参考文献14

  • 1Mambo M,Usuda K,Okamoto E.Proxy Signatures for Delegating Signing Operation[C].New Dehi:ACM Press,Proceedings of the 3rd ACM Conference on Computer and Communications Security,1996.48-57.
  • 2Mambo M,Usuda K,Okamoto E.Proxy Signatures:Delegation of the Power to Sign Messages[J].IEICE Trans.Fundamentals,1996,E79-A(9):1338-1354.
  • 3Zhang K.Threshold Proxy Signature Schemes[A].Proceedings of the 1st International Workshop on Information Security[C].Berlin:Springer-Verlag,1997.191-197.
  • 4Sun H M.Design of Time-stamped Proxy Signatures with Traceable Receivers[J].IEE Proc.Computers & Digital Techniques,2000,147(6):462-466.
  • 5Yi Lijiang,Bai Guoqiang,Xiao Guozhen.Proxy Multi-signature Scheme:A New Type of Proxy Signature Scheme[J].Electron Letter,2000,36(6):527-528.
  • 6Lin W D,Jan J K.A Security Personal Learning Tools Using a Proxy Blind Signature Scheme[C].Illinois,USA:Proceedings of International Conference on Chinese Language Computing,2000.273-277.
  • 7谭作文,刘卓军,唐春明.基于离散对数的代理盲签名(英文)[J].软件学报,2003,14(11):1931-1935. 被引量:91
  • 8Lal S,Awasthi A K.Proxy Blind Signature Scheme[EB/OL].http://eprint.iacr.org/2003/072.
  • 9王蜀洪,王贵林,鲍丰,王杰.对一个基于离散对数代理盲签名的密码分析(英文)[J].软件学报,2005,16(5):911-915. 被引量:22
  • 10Manik Lal Das,Ashutosh Saxena,Culati V P.Security Analysis of Lal and Awasthi's Proxy Signature Schemes[EB/OL].http://eprint.iacr.org/2003/263.pdf.

二级参考文献12

  • 1Stinson DR. Crvotoaraohv Theory and Practice. 2nd ed., New York: CRC Press, 2002. 282-285.
  • 2Tan ZW, Liu ZJ. Tang CM. Digital proxy blind signature schemes based on DLP and ECDLP. Vol.21, Beijing: Key Laboratory of Mathematics Mechanization Research, Academy of Mathematics and Systems Science, the Chinese of Academy of Sciences, 2002. 212-217.
  • 3Chaum D. Blind signature systems. In: Chaum D, ed. Proceedings of the Crypto'83. New York: Springer-Vedag, 1998. 153-156.
  • 4Chaum D, Fiat A, Naor M. Untraceable electronic cash. In: Goldwasser S, ed. Proceedings of the Crypto'88. LNCS 403, New York: Springer-Vedag, 1990. 319-327.
  • 5Chaum D, Boen B, Heyst E, Mjolsnes S, Steenbeek A. Efficient off-line electronic check. In: Quisquater J. Vandewalle J, eds. Proceedings of the Eurocrypt'89. LNCS 434, Berlin: Springer-Verlag, 1990. 294-301.
  • 6Brands S. Untraceable off-line cash in wallets with observers. In: Douglas RS, ed. Proceexlings of the Crypto'93. LNCS 773, New York: Springer-Verlag, 1994. 302-318.
  • 7Mambo M, Usuda K,Okamoto E. Proxy signatures for delegating signing operation. In: Proceedings of the 3rd ACM Conference on Computer and communications Security. New Delhi: ACM Press, 1996.48-57.
  • 8Lee B, Kim H, Kim K. Strong proxy signature and its applications. In: Proceedings of the 2001 Symposium on Cryptography and Information Security (SCIS 2001). 2001.
  • 9Zhang K. Threshold proxy signature schemes. In: Okamoto E, Davida G, Mambo M, eds. Proceedings of the Information Security Workshop 1997. LNCS 1396, Berlin: Springer-Verlag, 1998. 191-197.
  • 10Hsu CL, Wu TS, Wu TC. Improvement of threshold proxy signature scheme. Applied Mathematics and Computation, 2003,136:315-321.

共引文献97

同被引文献22

  • 1王蜀洪,王贵林,鲍丰,王杰.对一个基于离散对数代理盲签名的密码分析(英文)[J].软件学报,2005,16(5):911-915. 被引量:22
  • 2王天银,蔡晓秋,张建中.一种安全有效的代理盲签名方案[J].计算机工程,2007,33(2):148-149. 被引量:6
  • 3CHAUM D. Blind signatures for untraceable payments [ C ]//Proc of Advances in Cryptology Crypto. New York: Springer-Verlag, 1982: 199-203.
  • 4CHAUM D, FIAT A, NAOR M. Untraceable electronic cash LNCS 403 [ C ]//Proc of Crypto' 88. New York : Springer-Verlag, 1998 : 319- 327.
  • 5ABE M, FUJISAKI E. How to date blind signatures [ C ]//Proc of Advances in Cryptology- AISACRYPT' 96. Berlin: Springer- Verlag, 1996:244 - 251.
  • 6MAMBO M, USUDA K, OKMAMOTO E. Proxy signatures delegation of the power to sign message[ J]. IEICE Trans on Functional, 1996, E79-A(9) :1338-1354.
  • 7MAMBO M, USUDA K, OKMAMOTO E. Proxy signatures for delegating signing operation[ C]//Proc of the 3rd ACM Conference on Computer and Communications Security. New York: ACM Press, 1996:48- 57.
  • 8KIM S, PARK S, WON D. Proxy signatures, revisited [ C ]//Proc of Information and Communications Security. London: Springer-Verlag, 1997:223-232.
  • 9YI L, BAI G, XIAO G. Proxy multi-signature scheme [ J ]. Electronics Letters,2000,36(6) :527-528.
  • 10TAN Z, LIU Z, TANG C. Digital proxy blind signature schemes based on DLP and ECDLP[ C ]//Proc of MM Research Preprints, MMRC, AMSS, Academia, Sinica. Beijing: [ s. n. ] ,2002:212-217.

引证文献3

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部