期刊文献+

一个改进的代理盲签名方案 被引量:6

Improved proxy blind signature scheme
下载PDF
导出
摘要 通过对代理盲签名方案的分析,指出该方案不具有不可追踪性,攻击者可以原始签名者的身份再次发布代理公钥,代理授权阶段传输信道必须是安全信道,且原始签名者可以伪造代理签名者的盲签名等安全缺陷。针对这些安全缺陷,提出了一个新的代理盲签名方案,新的方案具有不可追踪性的特点,解决了攻击者再次发布代理公钥,代理签名者盲签名被伪造等问题,而且信息在非安全信道中仍可以安全传输,新的方案具有更高的安全性和实用性。新的方案可应用到电子现金等现实领域中,并给出了一个电子现金方案。 In this paper, we analyzed the proxy blind signature scheme proposed by Lal and Awasthi. We pointed out the insecurity of the L-A scheme. It is of the untraceability property. An adversary can republish the proxy public key and claim that he is the original signer. It needs a secure channel in the L-A scheme, and the original signer can forge the blind signature of the proxy signer. Then we proposed a new proxy blind signature scheme to overcome the pointed out drawback in L-A scheme. We proved that the new scheme is more secure and useful. As an instance, application of the new scheme in electronic cash was described.
出处 《计算机应用》 CSCD 北大核心 2007年第6期1539-1541,共3页 journal of Computer Applications
基金 中国博士后基金资助项目(2005038404) 山东省自然科学基金资助项目(Y2003A03)
关键词 代理签名 盲签名 代理盲签名 不可追踪性 proxy signature blind signature proxy blind signature unlinkability
  • 相关文献

参考文献14

  • 1CHAUM D.Blind signatures for untraceable payments[M].In 'Crypto' 82,New York:Plenum Press,1983.
  • 2MAMBO M,USUDA K,OKAMOTO E.Proxy Signatures:Delegation of the Power to sign messages[Z].
  • 3TAN Z,LIU Z,TANG C.Digital proxy blind signature schemes based on DLP and ECDLP[J].MM Research Preprints,2002,21(7):212-217.
  • 4LAL S,AWASTHI AK.Proxy Blind Signature Scheme.Journal of Information Science and Engineering[R].Cryptology eprint Archive,Report 2003/072.
  • 5SUN H-M,HSIEH B-T.On the Security of Some Proxy Signature Schemes[J/OL].Crytology ePrint Archive,Report 2003/068,http://eprint,iacr.org,2003.
  • 6谭作文,刘卓军,唐春明.基于离散对数的代理盲签名(英文)[J].软件学报,2003,14(11):1931-1935. 被引量:91
  • 7LEE B,KIM H,KIM K.Strong Proxy Signatures and Its Applications[A].Proc of SCIS[C].2001.603 -608.
  • 8李继国,曹珍富,李建中,张亦辰.代理签名的现状与进展[J].通信学报,2003,24(10):114-124. 被引量:56
  • 9WANG GL,BAO F,ZHOU JY,et al.Security analysis of some proxy Signatures[A].Proc.Information security and Cryptology -ICISC 2003,LNCS 2971[C].springer-verlag,2004.305-319.
  • 10SUN H,HSIEH B.On the security of some proxy blind signature schemes[A].AISW2004[C].Dunedin:Australian Computer Society Press,2004.75 -78.

二级参考文献59

  • 1李继国,曹珍富,张亦辰.Improvement of M-U-O and K-P-W proxy signature schemes[J].Journal of Harbin Institute of Technology(New Series),2002,9(2):145-148. 被引量:10
  • 2CHAUM D, EVERTSE J H, GRAFF J V. An improved protocol for demonstrating possession of discrete logarithms and some generalizations[A]. Proceedings of Eurocrypt'87 [C]. 1988. 127-141.
  • 3CHAUM D, EVERTSE J H, GRAFF J V, et al. Domonstrating possession of a discrete logarithm without levealing it[A]. Proceedings of Crypt'86 [C]. 1987. 200-212.
  • 4LANDFORD S. Weakness in some threshold cryptosystems [A]. Proc of Crypto'96 [C]. 1996. 74-82.
  • 5MAMBO M, USUDA If., OKAMOTO E. Proxy signatures for delegating signing operation[A]. Proc 3rd ACM Conference on Computer and Communications Security[C]. ACM Press, 1996. 48-57.
  • 6MAMBO M, USUDA K, OKAMOTO E. Proxy signatures: delegation of the power to sign messages[J]. IEICE Trans Fundam, 1996,E79-A (9): 1338-1354.
  • 7ZHANG IC Threshold proxy signature schemes[A]. 1997 Information Security Workshop[C]. Japan, 1997. 191-197.
  • 8SUN H M. LEE N Y. HWANG T. Threshold proxy signatures[J], IEE Proc Computers & Digital Techniques, 1999, 146(5): 259-263.
  • 9KIM S, PARK S, WON D. Proxy signatures, revisited [A]. Proc ICICS'97[C]. Int Conf on Information and Communications Seurity,LNCS, Springer-Verlag, 1997. 1334: 223-232.
  • 10SUN H M. An efficient nonrepudiable threshold proxy signature scheme with known signers[J]. Computer Communications, 1999,22(8): 717-722.

共引文献143

同被引文献40

引证文献6

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部