期刊文献+

基于身份的动态门限盲签名方案 被引量:1

An ID-based proactive threshold blind signature scheme
下载PDF
导出
摘要 提出一个基于身份的动态门限盲签名方案,签名者不知道他所签的消息的内容,签名信息不可追踪。方案能够防止私钥生成器(PKG)伪造签名。同时具有动态安全的特性,将签名的整个周期分成若干个时间段,每个时间段都要更新份额,且利用更新后的份额重构的密钥保持不变。最后证明了方案的正确性、不可伪造性和鲁棒性。 An ID-based proactive threshold blind signature scheme is presented. The signer does not know the content signed by himself, and the signed message cannot be tracked. In this scheme, the dishonest private key generator cannot impersonate any user at any time. At the same time the scheme has the property of proactive security, that is, the whole lifetime of the signature is divided into several time periods, and the shares of private key need to be renewed in each time period. However, new shares can construct the same private key as old shares, In the end, it is proved that the scheme is correct, non-forgeable and robust.
出处 《山东大学学报(理学版)》 CAS CSCD 北大核心 2008年第1期55-59,共5页 Journal of Shandong University(Natural Science)
基金 国家863高科技研究发展计划基金资助项目(2003AA141120,2004AA001260)
关键词 基于身份签名 门限签名 动态安全 双线性配对 盲签名 ID-based signature threshold signature proactive security bilinear paring blind signature
  • 相关文献

参考文献10

  • 1SHAMIR A.Identity-based cryptosystems and signature schemes[C]//B Blakely Proc Of Crypto'84,LNCS 196.Berlin:Springer-Verlag,1984:47- 53.
  • 2BONEH D,FRANKLIN M.Identity based encryption from the Weil pairing[C]// J Kilian Advances in Cryptology-Crypto 2001,LNCS 2139.Berlin:Springer-Verlag,2001:213-229.
  • 3BAEK J,ZHENG Y.Identity-based threshold decryption[C]// F Bao Public Key Cryptography Proceedings of PKC'04,LNCS 2947.Berlin:Springer-Verlag,2004:262-276.
  • 4CHEN Xiaofeng,ZHANG Fangguo,KONIDALA D M,et al.New ID-based threshold signature scheme from Weil pairing[C]// INDOCRYPT2004,LNCS 3348.Berlin:Springer-Verlag,2004:371-383.
  • 5CHAUM D.Blind signatures for untraceable payments[C]//Advances in Cryptology-CRYPTO'82,New York:Spring-Verlag,1983:199-203.
  • 6MAITLAND G,BOYD C.A provably secure restrictive partially blind signature scheme[C]// PKC'02,LNCS2274,Berlin:Springer-Verlag,2002:99-114.
  • 7HERABERG A,JARECKI S,KRAWCZYK H,et al.Proactive secret sharing,or:Howto cope with perpetual leakage[C]//D Coppersmith Advances in Crytptolgy-Crypto'95 Proceedings,LNCS 963.Berlin:Springer-Verlag,1995:339-352.
  • 8CHAUM D,PEDERSEN T P.Transferred cash grows in size[C]//R A Rueppel,Advances in Cryptology-Eurocrypt'92.proceedings,LNCS 658.Berlin:Springer-Verlag,1993:390-407.
  • 9GIRAULT M.Self-certifie public key[C]// Advances in Cryptology-Eurocrypt'91 proceedings,LNCS 547,Berlin:Springer-Verlag,1991:490-497.
  • 10CHEN Xiaofeng,ZHANG Fangguo,Kwangjo Kim.New ID-based threshold signature scheme from bilinear pairings[C]//Indocrypt'04,LNCS 3348,Berlin:Springer-Verlag,2004:371-383.

同被引文献5

  • 1Zhang Fangguo, Kim K. ID-based Blind Signature and Ring Signature from Pairings[C]//Proc. of ASIACRYPT'02. Berlin, Germany: Springer-Verlag, 2002: 533-547.
  • 2Zhang Fangguo, Kim K. Efficient ID-based Blind Signature and Proxy Signature from Bilinear Pairings[C]//Proc. of Australasian Conference on Information Security and Privacy. Berlin, Germany: Springer-Verlag, 2003: 312-323.
  • 3Chen Xiaofeng, Zhang Fangguo. /D-based Restrictive Partially Blind Signatures[C]//Proc. of Conference on Computational Intelligence and Security. Berlin, Germany: Springer-Verlag, 2005: 117-124.
  • 4Chen Xiaofeng, Zhang Fangguo. New ID-based Threshold Signature Scheme from Weil Pairing[C]//Proc. of INDOCRYPT'04. Berlin, Germany: Springer-Verlag, 2004:371-383.
  • 5崔巍,辛阳,胡程瑜,杨义先,李忠献.高效的基于身份的(受限)部分盲签名[J].北京邮电大学学报,2008,31(4):53-57. 被引量:20

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部