期刊文献+

改进的基于身份的代理盲签名

An Improved ID-Based Proxy Blind Signatures
下载PDF
导出
摘要 盲性是代理盲签名的一个重要特性.分析杜焕强等人的基于身份代理盲签名后发现其不具有盲性,本文对其进行了改进,改进后的方案克服了原方案的安全隐患,并且保留了原方案的其它优点. The blindness is an important property of a proxy blind signature scheme. Analysis of Du Huan-qiang et al's id-based proxy blind signature shows that it doesn't satisfy blindness. In this paper, an improvement is proposed, which not only mends the security leak but also retains the merits of the original id-based proxy blind signature scheme.
作者 王东勇
机构地区 清华大学理学院
出处 《甘肃联合大学学报(自然科学版)》 2008年第4期80-83,共4页 Journal of Gansu Lianhe University :Natural Sciences
关键词 代理盲签名 盲性 基于身份 双线性对 proxy blind signature blindness identity-based bilinear pairings
  • 相关文献

参考文献6

  • 1[1]MAMBO M,USUDA K,OKAMOTO E.Proxy signature:delegation of the power to sign messages[J].IEICE Transactions on Fundamentals,1996,E792A(9):1338-1353.
  • 2[2]CHAUM D.Blind signature for untraceable payments[C].Advances in Cryptology,Crypto'82,New York:Plenum Press,1983:199-203.
  • 3[3]SHAMIR A.Identity-based cryptosystems and signature schemes[C].Advances in Cryptology,Crypto'84,LNCS 196,1984:47-53.
  • 4[4]BONEH D,FRANKLIN M.Identity-based encryption from the weil pairing[C].Crypto 2001,LNCS 2139,2001:213-229.
  • 5[5]BONEH D,LYNN B,SHACHAM H.Short signature from the weil pairing[C].Asiacrypt 2001,LNCS 2248,2001:514-532.
  • 6杜焕强,吴铤,叶春涛.基于身份的代理盲签名[J].计算机应用,2007,27(11):2715-2717. 被引量:2

二级参考文献11

  • 1李素娟,张福泰.基于ID的代理盲签名[J].计算机工程,2006,32(17):203-204. 被引量:8
  • 2MAMBO M,USUDA K,OKAMOTO E.Proxy signature:delegation of the power to sign message[J].IEICE Transactions on Fundamentals,1996,E79-A(9):1338-1353.
  • 3ZHENG D,HUANG Z,CHEN K F,et al.ID-based proxy blind signature[C]// Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004).Los Alamipos:IEEE Computer Society,2004:380-383.
  • 4GU C X,ZHU Y F.An efficient ID-based proxy signature scheme from pairing[EB/OL].[2007-05-01].http://eprint.iacr.org/ 2006/158.
  • 5CHAUM D.Blind signature systems[C]// Advances in Cryptology -Crypto'83.New York:Plenum Press,1983:153.
  • 6SHAMIR A.Identity-based cryptosystems and signature schemes[C]// BLAKLEY G R,CHAUM D.Advances in Cryptology:CRYPTO 1984.Berlin:Springer,1984:47-53.
  • 7BARRETO P S L M,LIBERT B,McCULLAGHET N,et al.Efficient and provably-secure identity-based signatures and signcryption from bilinear maps[C]// ASIACRYPT 2005.Berlin:Springer,2005:515-532.
  • 8BONEH D,FRANKLIN M.Identity-based encryption from the Weil pairing[C]// KILIAN J.Advances in Cryptology:CRYPTO 2001.Berlin:Springer,2001:213-229.
  • 9SILVERMAN J H.The arithmetic of elliptic curves[M].New York:Springer-Verlag,1986.
  • 10MILLER V.Short programs for functions on curves[R/OL].(1986)[2007 -05 -01] http://crypto.Stanford.edu/miller/miller.pdf.

共引文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部