期刊文献+

一种不使用Hash和Redundancy函数的代理盲签名

Proxy blind signature without using Hash and Redundancy functions
下载PDF
导出
摘要 在密码学中,使用Hash函数和Redundancy函数必然使签名方案因这些函数的不安全性而遭受相关攻击,从而导致签名方案的安全性降低。提出了一种不使用Hash和Redundancy函数的代理盲签名,其安全性等价于解离散对数问题,而且避免了使用相关函数带来的威胁。分析表明,新方案实现了电子交易中的不可伪造性和不可链接性,有效防止了双方事后抵赖;而且减少了求幂运算的次数,避免了求Hash函数运算,使签名速度有了较大提高。 In Cryptography, the scheme of signature using Hash and Redundancy functions will be faced with related attacks. Therefore it will result in lower security. So a proxy blind signature scheme without using Hash and Redundancy Functions was proposed, whose security equaled to the difficulty of the discrete logarithm problem. And it avoided the insecurity of the related function. Analysis shows that this scheme has really completed unforgeability and unlinkability in the electronic tractions of business, and prevents the repudiation efficiently. Meantime, the new scheme reduces the computational load for exponentiation, avoids the computation for Hash function and improves the signing speed.
出处 《计算机应用》 CSCD 北大核心 2007年第12期2960-2961,2964,共3页 journal of Computer Applications
基金 重庆市教委科学技术研究资助项目(KJ060510)
关键词 代理盲签名 不可伪造性 不可链接性 proxy blind signature unforgeability, unlinkabihty
  • 相关文献

参考文献10

  • 1CHAUM D. Blind signature for untraceable payments [C/OL]// Advances in Cryptology-Eurocrypt'82. Berlin: Springer-Verlag, 1983:199-203 [2007 -03 - 15]. http://dsns. csie. nctu. edu.tw/research/crypto/HTML/PDF/C82/199. PDF.
  • 2MAMBO M, USUDA K, OKAMOTO E. Proxy signature: delegation of the power to sign messages [J]. IEICE Transactions on Fundaments, 1996, E79-A(9): 1338 - 1353.
  • 3LIN W D, JAN J K. A security personal learning tools using a proxy blind signature scheme [C]// Proceedings of International Conference on Chinese Language Computing. Illinois, USA: [ s. n. ], 2000:273 - 177.
  • 4谭作文,刘卓军,唐春明.基于离散对数的代理盲签名(英文)[J].软件学报,2003,14(11):1931-1935. 被引量:91
  • 5夏满民,谷利泽.一种新型的代理盲签名方案[J].北京邮电大学学报,2006,29(3):48-52. 被引量:17
  • 6CHIEN H Y. Forgery attacks on multi-signature schemes for authenticating mobile code delegates [J]. IEEE Transactions on Vehicular Technology, 2002, 51(6): 1669- 1671.
  • 7DOBBERTIN H. The status of MD5 after a recent attack [J]. Crypto-Bytes, 1996, 2(2) : 1 -6.
  • 8张学军,王育民.高效的基于身份的代理盲签名[J].计算机应用,2006,26(11):2586-2588. 被引量:16
  • 9吴晨煌,黄振杰.代理不可否认签名[J].计算机应用,2006,26(11):2592-2595. 被引量:4
  • 10袁丁,范平志.基于离散对数问题的盲数字签名改进方案[J].四川大学学报(自然科学版),2006,43(4):787-789. 被引量:2

二级参考文献78

  • 1谷利泽,李中献,杨义先.不需要可信任方的匿名代理签名方案[J].北京邮电大学学报,2005,28(1):48-50. 被引量:24
  • 2王蜀洪,王贵林,鲍丰,王杰.对一个基于离散对数代理盲签名的密码分析(英文)[J].软件学报,2005,16(5):911-915. 被引量:22
  • 3邱慧敏,杨义先,胡正名,周锡增.一种基于ElGamal数字签名的双向用户鉴别方案[J].北京邮电大学学报,2005,28(3):100-102. 被引量:9
  • 4Stinson DR. Crvotoaraohv Theory and Practice. 2nd ed., New York: CRC Press, 2002. 282-285.
  • 5Tan ZW, Liu ZJ. Tang CM. Digital proxy blind signature schemes based on DLP and ECDLP. Vol.21, Beijing: Key Laboratory of Mathematics Mechanization Research, Academy of Mathematics and Systems Science, the Chinese of Academy of Sciences, 2002. 212-217.
  • 6Chaum D. Blind signature systems. In: Chaum D, ed. Proceedings of the Crypto'83. New York: Springer-Vedag, 1998. 153-156.
  • 7Chaum D, Fiat A, Naor M. Untraceable electronic cash. In: Goldwasser S, ed. Proceedings of the Crypto'88. LNCS 403, New York: Springer-Vedag, 1990. 319-327.
  • 8Chaum D, Boen B, Heyst E, Mjolsnes S, Steenbeek A. Efficient off-line electronic check. In: Quisquater J. Vandewalle J, eds. Proceedings of the Eurocrypt'89. LNCS 434, Berlin: Springer-Verlag, 1990. 294-301.
  • 9Brands S. Untraceable off-line cash in wallets with observers. In: Douglas RS, ed. Proceexlings of the Crypto'93. LNCS 773, New York: Springer-Verlag, 1994. 302-318.
  • 10Mambo M, Usuda K,Okamoto E. Proxy signatures for delegating signing operation. In: Proceedings of the 3rd ACM Conference on Computer and communications Security. New Delhi: ACM Press, 1996.48-57.

共引文献111

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部