期刊文献+

A NEW EFFICIENT ID-BASED PROXY BLIND SIGNATURE SCHEME 被引量:2

A NEW EFFICIENT ID-BASED PROXY BLIND SIGNATURE SCHEME
下载PDF
导出
摘要 In a proxy blind signature scheme,the proxy signer is allowed to generate a blind signature on behalf of the original signer. The proxy blind signature scheme is useful in several applications such as e-voting,e-payment,etc. Recently,Zheng,et al. presented an IDentity(ID) -based proxy blind sig-nature. In this paper,a new efficient ID-based proxy blind signature scheme from bilinear pairings is proposed,which can satisfy the security properties of both the proxy signatures and the blind signature schemes. Analysis of the scheme efficiency shows that the new scheme is more efficient than Zheng,et al.'s scheme. The proposed scheme is more practical in the real world. In a proxy blind signature scheme, the proxy signer is allowed to generate a blind signature on behalf of the original signer. The proxy blind signature scheme is useful in several applications such as e-voting, e-payment, etc. Recently, Zheng, etal. presented an IDentity (ID)-based proxy blind signature. In this paper, a new efficient ID-based proxy blind signature scheme from bilinear pairings is proposed, which can satisfy the security properties of both the proxy signatures and the blind signature schemes. Analysis of the scheme efficiency shows that the new scheme is more efficient than Zheng, et al.'s scheme. The proposed scheme is more practical in the real world.
出处 《Journal of Electronics(China)》 2008年第2期226-231,共6页 电子科学学刊(英文版)
基金 the National Natural Science Foundation of China (No.60473027).
关键词 盲信号处理 数字签名 代理服务器 双线性配对 Blind signature Proxy signature Bilinear pairing
  • 相关文献

参考文献10

  • 1D. Chaum.Blind signatures for untraceable payments[].Advances in Cryptology-Crypto’.1983
  • 2M. Mambo,,K. Usuda,,and E. Okamoto.Proxy sig-natures: Delegation of the power to sign messages[].IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences.1996
  • 3M. Mambo,,K. Usuda,,and E. Okamoto.Proxy sig- natures for delegating signing operation[].Proceedings of the rd ACM Conference on Computer and Communications Security-CCS’.1996
  • 4S. Kim,,S. Park,,and D. Won.Proxy signatures, re- visited[].Proceedings of the first International Con- ference on Information and Communications Secu- rity-ICICS’.1997
  • 5T. Okamoto,,M. Tada,,and E. Okamoto.Extended proxy signatures for smart cards[].Proceedings of the nd International Information Security Work- shop-ISW’ November –.6–71999
  • 6S. D. Galbraith,,K. Harrison,and D. Soldera.Im- plementing the Tate pairing[].Proceedings of the th International Algorithmic Number Theory Sympo- sium-ANTS-V’.2002
  • 7A. Shamir.Identity-based cryptosystems and signa- ture schemes[].Advances in Cryptology-Crypto’.1984
  • 8Z. Tan,Z. Liu,and C. Tang.Digital proxy blind signature schemes based on DLP and ECDLP[].MM Research Preprints.2002
  • 9A. K. Awasthi,and S. Lal.Proxy blind signature scheme[].JFCR Trans on Cryptology.2005
  • 10H. M. Sun,,B. T. Hsieh,,and S. M. Tseng.On the security of some proxy signature schemes[].Journal of System and Software.2005

同被引文献8

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部