期刊文献+

一种基于椭圆曲线的代理盲签名方案 被引量:1

A Proxy Blind Signature Scheme Based on Elliptic Curve
下载PDF
导出
摘要 结合代理签名和盲签名的特性,提出了一种基于椭圆曲线的代理盲签名方案。并对该方案的安全性进行了分析。在该方案中还引用了一种新的安全哈希算法。 This article proposes a proxy blind signature scheme based on elliptic curve,which combines the speciality of the proxy signature and the blind signature.The security of this scheme is also analyzed.It also imports a new safe Hash algorithm in this scheme.
出处 《计算机与现代化》 2008年第5期84-85,89,共3页 Computer and Modernization
基金 国家自然科学基金资助项目(10671056) 河南大学校内重点基金资助项目(05ZDZR001)
关键词 代理签名 盲签名 椭圆曲线 安全哈希算法-224 proxy signature blind signature elliptic curve SHA-224
  • 相关文献

参考文献10

  • 1Mambo M, Usuda K , Okamoto E. Proxy signature delegation of the power to sign messages [C]//IEICE Trans, 1996 ,E79A(9): 1338-1354.
  • 2白国强,黄谆,陈弘毅,肖国镇.基于椭圆曲线的代理数字签名[J].电子学报,2003,31(11):1659-1663. 被引量:33
  • 3Chaum D. Bhnd signatures fc.r untraceable payments [ C ]// Advances in Cryptology-CRYPTO' 82 Proceedings, Plenum Press, 1983 : 199-203.
  • 4Odlyzko A M. Discrete logarithras: The past and the future [J]. Designs, Codes, and Cryptography, 19(2-3): 129- 145.
  • 5FIPS Publication 180-2, Secure Hash Standard (Change Notice 1) [S]. U. S. DoC/NIST. February 25, 2004:72- 79.
  • 6Koblitz N, Menezes A, Vanstone S. The state of elliptic curve cryptography [ J ]. Designs, Codes and Cryptography, (2000), 19(2-3):173-193.
  • 7谭作文,刘卓军,唐春明.基于离散对数的代理盲签名(英文)[J].软件学报,2003,14(11):1931-1935. 被引量:91
  • 8夏满民,谷利泽.一种新型的代理盲签名方案[J].北京邮电大学学报,2006,29(3):48-52. 被引量:17
  • 9Lai S, Awasthi A K. Proxy Blind Signature Scheme [J/ OL]. http://ePrint. iacr. org/2003/072, 2003-05-11.
  • 10赵泽茂.基于椭圆曲线的代理盲签名方案[J].河海大学学报(自然科学版),2006,34(3):329-332. 被引量:5

二级参考文献31

  • 1谷利泽,李中献,杨义先.不需要可信任方的匿名代理签名方案[J].北京邮电大学学报,2005,28(1):48-50. 被引量:24
  • 2邱慧敏,杨义先,胡正名,周锡增.一种基于ElGamal数字签名的双向用户鉴别方案[J].北京邮电大学学报,2005,28(3):100-102. 被引量:9
  • 3Stinson DR. Crvotoaraohv Theory and Practice. 2nd ed., New York: CRC Press, 2002. 282-285.
  • 4Tan ZW, Liu ZJ. Tang CM. Digital proxy blind signature schemes based on DLP and ECDLP. Vol.21, Beijing: Key Laboratory of Mathematics Mechanization Research, Academy of Mathematics and Systems Science, the Chinese of Academy of Sciences, 2002. 212-217.
  • 5Chaum D. Blind signature systems. In: Chaum D, ed. Proceedings of the Crypto'83. New York: Springer-Vedag, 1998. 153-156.
  • 6Chaum D, Fiat A, Naor M. Untraceable electronic cash. In: Goldwasser S, ed. Proceedings of the Crypto'88. LNCS 403, New York: Springer-Vedag, 1990. 319-327.
  • 7Chaum D, Boen B, Heyst E, Mjolsnes S, Steenbeek A. Efficient off-line electronic check. In: Quisquater J. Vandewalle J, eds. Proceedings of the Eurocrypt'89. LNCS 434, Berlin: Springer-Verlag, 1990. 294-301.
  • 8Brands S. Untraceable off-line cash in wallets with observers. In: Douglas RS, ed. Proceexlings of the Crypto'93. LNCS 773, New York: Springer-Verlag, 1994. 302-318.
  • 9Mambo M, Usuda K,Okamoto E. Proxy signatures for delegating signing operation. In: Proceedings of the 3rd ACM Conference on Computer and communications Security. New Delhi: ACM Press, 1996.48-57.
  • 10Lee B, Kim H, Kim K. Strong proxy signature and its applications. In: Proceedings of the 2001 Symposium on Cryptography and Information Security (SCIS 2001). 2001.

共引文献131

同被引文献10

  • 1赵泽茂.基于椭圆曲线的代理盲签名方案[J].河海大学学报(自然科学版),2006,34(3):329-332. 被引量:5
  • 2Miller V C.Use of elliptic curves in cryptography[C]//Williams H C.Advances in cryptology-proceedings:CRYPTO'85 proceedings.Berlin:Springer-Verlag,1986:417-426.
  • 3Koblitz N.Elliptic curve cryptosystems[J].Mathematics of Computation.1987,48:203-209.
  • 4Chaum D.Blind signatures for untraceable payments[C]// Advances in cryptology.New York:Springer,1983:199-203.
  • 5Mambo M,Usda K,Okamoto E.Proxy signature for delegating signing operation[C]//Proceedings of the 3rd ACM conference on com-puter and communication security.New York:ACM Press,1996:48-57.
  • 6Lin W D,Jan J K.A security personal learning tools using a proxy blind signature scheme[C]//Proceedings of international conferenceon Chinese language computing.Illinois:[s.n.],2000:273-277.
  • 7Pradhan S,Mohapatra R K.Proxy blind signature based on ECDLP[J].International Journal of Engineering Science and Technology,2011,3(3):2244-2248.
  • 8Alghazzawi D M,Salim T M,Hasan S H.A secure proxy blind signature scheme using ECC[M]//Fong S.Networked digital technol-ogies.Berlin:Springer-Verlag,2011:47-52.
  • 9逯玲娜,周梦.基于椭圆曲线的代理盲签名新方案[J].重庆科技学院学报(自然科学版),2010,12(4):155-157. 被引量:1
  • 10孙剑,李昆,徐莹.一种新的基于椭圆曲线的代理盲签名方案[J].工业控制计算机,2013,26(6):97-97. 被引量:1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部