期刊文献+

对一种代理盲签名方案的密码学分析 被引量:1

Cryptanalysis of proxy blind signature scheme
下载PDF
导出
摘要 Zhao等提出了一个新的代理盲签名方案,并在此基础上,考虑了签名方程中所有可能的参数选取方法,由此给出了构造代理盲签名方案的一般方法,给出了生成代理密钥的8个方程式。对他们提出的代理盲签名进行了分析,给出了一种伪造攻击,利用这种攻击,不诚实的原始签名人可以成功伪造代理签名密钥,从而假冒诚实的代理签名人生成验证有效的签名,威胁到代理签名人的权益。在Zhao等给出的8种代理密钥方程式中,有一半都无法抵抗这种攻击。 A new proxy blind signature scheme was proposed by Zhao et al. recently. Based on this scheme, all possible parameters to be chosen in signature equations were considered and a general method to construct proxy blind signature was obtained, They also proposed eight equations to generate secure proxy signing key. However, their scheme was insecure. A forgery attack on their proxy blind signature scheme was proposed in this paper. Using the forgery attack, a dishonest original signer can forge the proxy signing key and produce valid proxy blind signatures. Among the eight equations of producing proxy signing key, half of them can not resist this kind of attack.
出处 《计算机应用》 CSCD 北大核心 2008年第5期1144-1145,共2页 journal of Computer Applications
基金 国家自然科学基金资助项目(60573043)
关键词 数字签名 代理签名 代理盲签名 digital signature proxy signature proxy blind signature
  • 相关文献

参考文献2

二级参考文献12

  • 1Stinson DR. Crvotoaraohv Theory and Practice. 2nd ed., New York: CRC Press, 2002. 282-285.
  • 2Tan ZW, Liu ZJ. Tang CM. Digital proxy blind signature schemes based on DLP and ECDLP. Vol.21, Beijing: Key Laboratory of Mathematics Mechanization Research, Academy of Mathematics and Systems Science, the Chinese of Academy of Sciences, 2002. 212-217.
  • 3Chaum D. Blind signature systems. In: Chaum D, ed. Proceedings of the Crypto'83. New York: Springer-Vedag, 1998. 153-156.
  • 4Chaum D, Fiat A, Naor M. Untraceable electronic cash. In: Goldwasser S, ed. Proceedings of the Crypto'88. LNCS 403, New York: Springer-Vedag, 1990. 319-327.
  • 5Chaum D, Boen B, Heyst E, Mjolsnes S, Steenbeek A. Efficient off-line electronic check. In: Quisquater J. Vandewalle J, eds. Proceedings of the Eurocrypt'89. LNCS 434, Berlin: Springer-Verlag, 1990. 294-301.
  • 6Brands S. Untraceable off-line cash in wallets with observers. In: Douglas RS, ed. Proceexlings of the Crypto'93. LNCS 773, New York: Springer-Verlag, 1994. 302-318.
  • 7Mambo M, Usuda K,Okamoto E. Proxy signatures for delegating signing operation. In: Proceedings of the 3rd ACM Conference on Computer and communications Security. New Delhi: ACM Press, 1996.48-57.
  • 8Lee B, Kim H, Kim K. Strong proxy signature and its applications. In: Proceedings of the 2001 Symposium on Cryptography and Information Security (SCIS 2001). 2001.
  • 9Zhang K. Threshold proxy signature schemes. In: Okamoto E, Davida G, Mambo M, eds. Proceedings of the Information Security Workshop 1997. LNCS 1396, Berlin: Springer-Verlag, 1998. 191-197.
  • 10Hsu CL, Wu TS, Wu TC. Improvement of threshold proxy signature scheme. Applied Mathematics and Computation, 2003,136:315-321.

共引文献94

同被引文献13

  • 1LANGWei-min,YANGZong-kai,CHENGWen-qing,TANYun-meng.A New ID-Based Proxy Blind Signature Scheme[J].Wuhan University Journal of Natural Sciences,2005,10(3):555-558. 被引量:3
  • 2张学军,王育民.高效的基于身份的代理盲签名[J].计算机应用,2006,26(11):2586-2588. 被引量:16
  • 3黄辉,秦静,李丽.一个改进的代理盲签名方案[J].计算机应用,2007,27(6):1539-1541. 被引量:6
  • 4胡江红,张建中.新的基于双线性对的多级强代理盲签名方案[J].计算机工程与应用,2007,43(18):123-125. 被引量:11
  • 5Mambo M, Usdua K, Okamoto E. Proxy signature: delegation of the power to sign messages[ J]. IEICE Transactions on Fundations, 1996, E79 - A(9) : 1 338 - 1 353.
  • 6Zhang F,Safavi-Naini R, Lin C Y.New proxy signature,proxy blind signature and proxy ring signature schemes from bilinear pairing [ EB/OL]. http://eprint, iacr. org,2003 - 10 - 04.
  • 7Chaum D. Bind signature for untraceable payments[ A ]. Chaun D, Rivest R L Swpman A T. Advances in Cryptology: Proceedings of Crypto' 82[ C]. New York: Plemum, 1983.199 - 203.
  • 8Lin W,Jan J K.A security personal learning tools using a proxy bind signature scheme[ A] .Proceedings of International Conference on Chinese Language Computing[ C]. USA: Chinese Language Computer Society Knowledge Systems Institute,2000.273- 277.
  • 9ZHANG Jian-hong, MAO Jian. Linkability analysis of some blind signature schemes[ A]. International Conference on Computational Intelligence and Security 2006[ C ]. Berlin: Springer, 2007. 556 - 566.
  • 10Sherman S M Chow. Blind signature and ring signature schemes: Rehabilitation and attack[ J]. Computer Standards and Interfaces, 2008, 31(4) :707 - 712.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部