期刊文献+

具有前向安全特性的盲签名方案 被引量:2

Blind Signature Scheme with Forward Security
下载PDF
导出
摘要 盲签名和前向安全特性在密码学研究中已成为热点.盲签名在实际应用中起着保护消息发送方隐私权的重要作用.前向安全特性能有效地减少因签名密钥泄露而带来的损失,即使签名密钥在j时段被盗,窃密者也仅能伪造j时段后的有效签名,而j时段前的签名仍然有效.基于ElGamal体制提出了一种具有前向安全特性的盲签名方案,将前向安全特性引入到盲签名方案中,并分析了该方案的安全性. Blind signature and forward security have become the hot points in the research of cryptography. Blind signature plays an important role in protecting the senders' privacy. Forward security can effectively reduce the loss caused by exposure of secret keys. To a forward security signature scheme, even if the signature key of priod j is usurped, the usurper can only forge the valid signature after period j and the signature before period j is still secure. In this paper, the authors present a blind signature scheme with forward security based on ElGamal, which applied the characteristics of forward security to the blind signature scheme. Furthermore, the security of the proposed scheme is analyzed.
出处 《徐州师范大学学报(自然科学版)》 CAS 2007年第2期50-54,共5页 Journal of Xuzhou Normal University(Natural Science Edition)
基金 国家自然科学基金资助项目(60473012)
关键词 前向安全 盲签名 EIGAMAL forward security blind signatures E1Gamal
  • 相关文献

参考文献17

  • 1Christoph G G. An identity-based key-exchange protocol[C]//Lecture Notes in Computer Science. Advances in Cryptology EUROCRYPT89, Houthalen, Belgium. New York : Springer-Verlag, 1990 : 29 -- 37.
  • 2Ross Anderson. Two remarks on public key cryptology[C]. The Fourth ACM Computer and Communication Security. New York: ACM Press, 1997:151 -- 160.
  • 3Mihir Bellare,Sara K. Miner. A forward-secure digital signature scheme[C]//Wiener M. Lecture Notes in Computer Science Vol. 1666. Advances in Cryptology-CRYPTO'99. Berlin:Spring-Verlag, 1999:431--448.
  • 4Hugo Krawczyk. Simple forward-secure signatures from any signature scheme[C]//Seventh ACM Conference on Computer and Communication Security, Athens, Greece. New York: ACM Press, 2000 : 108 -- 115.
  • 5Tal Malkin,Daniele Micciancio,Sara K Miner. Efficient generic forward-secure signatures with an unbounded num- ber of time periods[C]//Lecture Notes in Computer Science Vol. 2332. Proc of the CRYPTO 2002, Int'l Conf on the Theory and Applications of Cryptographic Techniques. Berlin: Springer,2002:400--417.
  • 6Chaum D. Blind signature for untraceable payments[C]//Lecture Notes in Computer Science. Advances in Cryptology, Proc Crypto' 82. New York: Plenum Press, Springer-Verlag, 1983 : 199 -- 203.
  • 7Harn L. Cryptanalysis of the blind signature based on the discrete logarithm problem[J]. Electronics Letters, 1995, 31(14):1136.
  • 8Masayuki Abe, Eiichiro Fujisaki. How to date blind signatures [C]//Advances in Cryptology-Asiacrypt, Lecture Notes in Computer Science Vol. 1163. Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security. London: Springer-Verlag, 1996:244 -- 251.
  • 9Tatsuaki Okamoto. Provable secure and practical identification schemes and corresponding signature schemes[C]// Lecture Notes in Computer Science Vol. 740. Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology. London: Springer-Verlag, 1992:31 -- 53.
  • 10Jan L C,Jean-Marc P, Markus A S. Blind signatures based on the discrete logarithm problem[C]. Advances in Cryptology Eurocrypt ' 94, LNCS, 1995 : 428-- 432.

二级参考文献22

  • 1祁明.数字签名及其在信息安全协议中的应用:博士论文[M].西安:西安电子科技大学,1996..
  • 2[1]Miller V. Uses of elliptic curves incryptography[A]. Williams H C eds. Advances in Cryptology-CRYPTO′85 Proceedings, LNCS218[C].Berlin: Springer-Verlag, 1986. 417-426.
  • 3[2]T ElGamal. A public key cryptosystem andsignature scheme based on discrete logarithm[J].IEEE Trans.,1985,IT-31(4):469-472.
  • 4[3]L Ham. New digital signature scheme based on discrete logarithm[J]. Electronics Letters,1994,30(5):396-398.
  • 5[4]Miyaji A. Elliptic curves over Fp suitable for cryptosystems[A].Advances in Cryptology-AUSCRYPT′92 Proceedings,LNCS718[C].Berlin:Springer-Verlag, 1993.479-491.
  • 6[5]Menezes A, Okamoto T, Vanstone S. Reducing elliptic curve logarithms to logarithms in a finite field[J].IEEETIT,1993,39(5):1639-1646.
  • 7D Chaum.Blind signatures for untraceable payments[C].In : Advanced in Cryptology,Proc Crypto'82,Spfinger-Verlag, 1983:199-203.
  • 8D Chaum.Security without identification:transaction systems to make big brother obsolete[J].Communications of the ACM,1985; (28): 1030-1044.
  • 9B Schneier.Appliced cryptography-protocols, algorithms and source code in C[M].New York:Wiley Press Inc,1994.
  • 10C Radu,M Vandenwauver,R Govaerts et al.An efficient traceable payment system[C].In:Proc of the 16th Symposium on Information Theory in the Benelux,1995:61-67.

共引文献97

同被引文献13

  • 1李虓,何明星.基于RSA的前向安全的数字签名[J].计算机工程与应用,2006,42(16):124-126. 被引量:7
  • 2张小萍,于静洋,梁斌梅.改进的基于身份的盲签名[J].计算机工程与设计,2006,27(21):4123-4124. 被引量:2
  • 3蔡伟鸿,邓宇乔.一个具有前向安全性的电子现金系统[J].计算机工程与应用,2007,43(7):152-154. 被引量:3
  • 4张学军,王育民.高效的基于身份的部分盲签名[J].计算机工程与应用,2007,43(11):211-212. 被引量:11
  • 5David Chaum.Blind signature for untraceable payments[C],Advances in Cryptology-Crypto'82 Proceeding,LNCS,Plenum NewYork 1983,199-203.
  • 60kamoto T.Provable secure and practical identification schemes and corresponding signature re schemes[C].LNCS Vol.740,Proceedings of the 12th Annual International Cryptology Co nference on Advances in Cryptology,.Springer-Verlag,London,UK,1992:31-53.
  • 7Adi shamire.Identity-based cryptosystems and signature schemes[C].Proceedings of CRYPTO 84 on Advances in cryptology.Springer-Verlag,New York:1985 47-53.
  • 8Fangguo Zhang,Kwangjo Kim.ID-based blind signature and ring signature from pairings[C].Proceedings of the 8th International Conference on the Theory and Application of Cry-ptology and Information Security:Advances in Cryptology,LNCS Vol.2501.Springer-Ver-lag,London,UK 2002:533-547.
  • 9Fangguo Zhang.Kwangjo Kim.Efficient ID-based blind signature and proxy signature from bilinear parings[C].ACISP 2003,LNCS Vol.2727.Springer-Verlag.2003:312-323.
  • 10Chow S S M,Hui L C K,Yiu H S M,et al.Two improved partially blind signature schemes from bilinear pairings.http://eprint.iacr.org/2004/108.pdf.

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部