期刊文献+

一种指定接收人的代理盲签名方案 被引量:1

A designated-verifier proxy blind signature scheme
下载PDF
导出
摘要 基于two-party Schnorr签名方案,提出一种指定接收人的代理盲签名方案。在代理授权的过程中,原始签名人和代理签名人通过two-party Schnorr签名方案产生用于代理签名的密钥;在代理签名过程中,签名请求者先用RSA算法加密消息,然后使用指定接收人的签名方案获得相应的代理盲签名。该方案中,只有指定接收者才可以恢复消息、验证签名的合法性,通过执行交互的零知识证明,指定接收人可以向第3方证实签名的有效性。安全性分析表明,该方案不仅满足代理盲签名方案的基本安全要求,而且间接地起到了对代理签名人的代理签名的监督作用,防止代理签名人滥用他们的代理签名权。与其他方案相比,该方案具有成本低、计算速度快等优点。 Based on the two-party Schnorr signature, a new designated-verifier proxy blind signature scheme was proposed. In delegation authorization, the original signer and proxy signer generate proxy key pair through two-party Schnorr signature. In proxy signature generation, the applicant encrypts the message by RSA public-key cryptosystem and then gets its proxy blind signature by the nominative signature scheme. In this scheme, only the recipient can recover the message and verify the signature. Through perfonning a zero-knowledge protocol, the recipient can prove validity of signature to a third party. Security analysis results show that the proposed scheme not only meets the basic security requirements of proxy blind signature, but can also indirectly supervise the proxy signature and prevent the proxy signer from misusing the proxy signature rights. This scheme is less expensive and more efficient than others.
出处 《中南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2008年第1期162-165,共4页 Journal of Central South University:Science and Technology
基金 国家自然科学基金资助项目(60773013) 湖南省自然科学基金资助项目(07JJ5078)
关键词 代理签名 盲签名 指定接收人签名 proxy signature blind signature designated-verifier signature
  • 相关文献

参考文献14

  • 1Mambo M, Usuda K, Okamoto E. Proxy signatures: Delegation of the power to sign message[J]. IEICE Trans of Fundamentals, 1996, E79-A(9): 1338-1354.
  • 2Mambo M, Usuda K, Okamoto E. Proxy signatures for delegation signing operation[C]//Proc of the 3rd ACM Conf on Computer and Communication Security. New York: ACM Press, 1996: 48-57.
  • 3Chaum D. Blind signature systems[C]//Chaum D. Proceedings of the Crypto'83. New York: Springer-Verlag, 1998: 153-156.
  • 4Chaurn D, Fiat A, Naor M. Untraceable electronic cash[C]//Goldwasser S, ed. Proceedings of the Crypto'88. New York: Springer-Verlag, 1990:319-327.
  • 5Liu W D, Jan J K. A security personal learning tools using a proxy blind signature scheme[C]//Proceeding of International Conference on Chinese Language Computing. Illinois, 2000: 273-277.
  • 6谭作文,刘卓军,唐春明.基于离散对数的代理盲签名(英文)[J].软件学报,2003,14(11):1931-1935. 被引量:91
  • 7Nicolosi A, Krohn M, Dodis Y, et al. Proactive two-patty signatures for user authentication[C]//Proceedings of 10th Annual Network and Distributed System Security Symposium. The Internet Society, 2003: 233-248.
  • 8Wang G.DeSignated-verifier proxy signature schemes[C]// Security and Privacy in the Age of Ubiquitous Computing (IFIP/SEC 2005). Springer, 2005: 409-423.
  • 9Huang Z, Wang Y. Convertible nominative signatures[C]//Proc. of Information Security and Privacy (ACISP'04). LNCS 3108. Springer-Verlag, 2004: 348-357.
  • 10王晓明,符方伟.可撤销匿名性的盲代理签名方案[J].计算机学报,2003,26(1):51-54. 被引量:23

二级参考文献25

  • 1[1]Mambo M, Usuda K, Okamoto E. Proxy signature: Delegation to sign messages. IEICE Transactions on Fundamentals, 1996,E79-A (9): 1338~1354
  • 2[2]Kim S, Park S, Won D. Proxy signatures, revisited. In: Lecture Notes in Computer Science 1334, Berlin: Springer-Verlag, 1997, 1334:223~232
  • 3[3]Zhang K. Threshold proxy signature scheme. In:Proceedings of Information Security Workshop, Japan, 1977. 101 ~ 109
  • 4[4]Yi L J, Bai G Q, Xiao G Z. Proxy multi-signature scheme: A new type of proxy signature scherne. Electronics Letters, 2000,36(6) :527~528
  • 5Stinson DR. Crvotoaraohv Theory and Practice. 2nd ed., New York: CRC Press, 2002. 282-285.
  • 6Tan ZW, Liu ZJ. Tang CM. Digital proxy blind signature schemes based on DLP and ECDLP. Vol.21, Beijing: Key Laboratory of Mathematics Mechanization Research, Academy of Mathematics and Systems Science, the Chinese of Academy of Sciences, 2002. 212-217.
  • 7Chaum D. Blind signature systems. In: Chaum D, ed. Proceedings of the Crypto'83. New York: Springer-Vedag, 1998. 153-156.
  • 8Chaum D, Fiat A, Naor M. Untraceable electronic cash. In: Goldwasser S, ed. Proceedings of the Crypto'88. LNCS 403, New York: Springer-Vedag, 1990. 319-327.
  • 9Chaum D, Boen B, Heyst E, Mjolsnes S, Steenbeek A. Efficient off-line electronic check. In: Quisquater J. Vandewalle J, eds. Proceedings of the Eurocrypt'89. LNCS 434, Berlin: Springer-Verlag, 1990. 294-301.
  • 10Brands S. Untraceable off-line cash in wallets with observers. In: Douglas RS, ed. Proceexlings of the Crypto'93. LNCS 773, New York: Springer-Verlag, 1994. 302-318.

共引文献111

同被引文献11

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部