期刊文献+

Nyberg-Rueppel签名的部分盲化

Partial blind signatures based on Nyberg-Rueppel signature
下载PDF
导出
摘要 在分析盲签名固有缺点的基础上,引入三个随机参数,完整地解决了Nyberg-Rueppel消息恢复签名的部分盲化问题,给出了Nyberg-Rueppel消息恢复签名的一般性部分盲化方法。通过对参数的不同选取,得到三个部分盲签名方案并对其进行效率比较,结论是方案1的效率高于方案2和3。方案2类似于张彤等人提出的方案,但是他们的方案无法抵抗窜改协定信息攻击,提出的方案在签名时使用了hash函数,从而可以抵抗这种攻击。对提出的方案进行安全性分析,结论是提出的方案具有完备性、不可伪造性和部分盲性。 One shortcoming of blind signature was that, since the signer' s view was completely shut off from the resulting signatures, the signatures may be used in an unintended way. This paper proposed a generalized Nyberg-Rueppel message recovery partial blind signature scheme by introducing three random parameters. Three partial blind signature schemes were obtained by choosing different parameters and the comparison of their efficiency was given, which shows that the first scheme is more efficient than the other two. The second scheme is similar to the scheme proposed by Zhangtong et al, but their scheme is not against changing agreed information attack. The proposed schemes are against this kind attack because of the employment of hash function. The security analysis of the proposed schemes was given, which shows they have the property of completeness, unforgeability and partial blindness.
出处 《计算机应用研究》 CSCD 北大核心 2008年第1期251-253,共3页 Application Research of Computers
基金 国家自然科学基金资助项目(60573043)
关键词 密码学 数字签名 部分盲签名 cryptography digital signature partial blind signature
  • 相关文献

参考文献8

  • 1CHAUM D.Blind signatures for untraceable payments[C]//Proc of Advances in Cryptology (Crypto'82).[S.l.]:Prenum Publishing Corporation,1982:199-204.
  • 2ABE M,FUJISAKI E.How to date blind signatures[C]//Proc of Advances in Cryptology (Asiacrypt'96).Berlin:Springer-Verlag,1996:244-251.
  • 3ABE M,OKAMOTO T.Provably secure partially blind signatures[C]//Proc of Advances in Cryptology(Crypto2000).Berlin:Springer-Verlag,2000:271-286.
  • 4ZHANG F,SAFAVI N R,SUSILO W.Efficient verifiably encrypted signature and partially blind signature from bilinear pairings[C]//Proc of Indocrypt'03.Berlin:Springer-Verlag,2003:191-204.
  • 5NYBERG K,RUEPPEL L R.A new signature scheme based on the DSA giving message recovery[C]//Proc of the 1st ACM Conference on Computer and Communication Security.[S.l.]:ACM Press,1993:58-61.
  • 6CAMENISCH J L,PIVETEAU J M,STADLER M.Blind signatures based on the discrete logarithm problem[C]//Proc of Advances in Cryptology(Eurocrypt'94).Berlin:Springer-Verlag,1994:428-432.
  • 7黄振杰,王育民,陈克非.Nyberg-Rueppel消息恢复盲签名的一般化和改进[J].通信学报,2005,26(12):131-135. 被引量:10
  • 8张彤,王育民.几种部分盲签名的算法设计及其安全性分析[J].西安电子科技大学学报,2004,31(6):963-966. 被引量:10

二级参考文献26

  • 1LEE H,KIM T.Message recovery fair blind signature[A].PKC'99[C].LNCS 1560,Berlin:Springer-Verlag,1999.97-111.
  • 2ABE M,FUJISAKI E.How to date blind signatures[A].Advances in Cryptology-Asiacrypt'96[C].LNCS 1163,Berlin:Springer-Verlag,1996.244-251.
  • 3ABE M,OKAMOTO T.Provably secure partially blind signatures[A].Advances in Cryptology-CRYPTO2000[C].LNCS 1880,Berlin:Springer-Verlag,2000.271-286.
  • 4MAITLAND G,BOYD C.A provably secure restrictive partially blindsignature scheme[A].Public Key Cryptography,PKC 2002[C].LNCS 2274,Berlin:Springer-Verlag,2002,99-114.
  • 5NYBERG K,RUEPPEL L R.A new signature scheme based on the DSA giving message recovery[A].1st ACM Conference on Computer and Communication Security[C].ACM Press,1993.58-61.
  • 6FIAT A,SHAMIR A.How to prove yourself:practical solutions of identification and signature problems[A].Advances in Cryptology-CRYPTO'86[C].LNCS 263,Berlin:Springer-Verlag,1996.186-194.
  • 7BELLARE M,ROGAWAY P.Random oracles are practical:a paradigms for designing efficient protocols[A].Proc of the 1st ACM Conference on Computer Communication Security[C].ACM Press,1993.62-73.
  • 8NECHAEV V I.Complexity of a determinate algorithm for the discrete logarithm[J].Mathematical Notes,1994,55:165-172.
  • 9SHOUP V.Lower bounds for discrete logarithms and related problems[A].Advances in Cryptology-Eurocrypt'97[C].LNCS 1233,Berlin:Springer-Verlag,1997.256-266.
  • 10SCHNORR C P.Security of Blind discrete log signatures against Interactive Attacks[A].ICICS 2001[C].LNCS 2229,Berlin:Springer-Verlag,2001.1-12.

共引文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部