期刊文献+

依托BLS签名的基于身份盲签名方案 被引量:2

Identity-based blind signature scheme based on BLS signatures
下载PDF
导出
摘要 依托Boneh等人提出的签名(BLS签名)算法、BLS签名的盲生成算法和BLS签名的聚合算法,提出了一种高效的基于身份盲签名方案。该方案具有轮复杂度最优的特点,即盲签名的生成协议只需用户和签名者依次发送一次信息。它的安全性基于one-more CDH假设,而其他方案则依赖于一个更强的假设——ROS假设。另外,它还具有计算效率高,签名长度短等特点,特别适合电子现金、网络投票等具体应用。 Depending on BLS signing algorithm, blind signing algorithm of BLS signatures, and aggregating algorithm of BLS signatures, a new efficient identity-based blind signature scheme was proposed. First, the round complexity of this scheme was optimal, i.e. it was enough for the user and the signer to respectively transmit only one message during each blind signing process. Second, its security was based on the so-called one-more Computational Diffie-Hellman Assumption (CDH) assumption, while the security of the other similar identity-based signature scheme was based on the stronger assumption - ROS assumption. Additionally, this scheme was computationally efficient and had very short signature length. Therefore, it was very suitable for the applications such as e-cash and e-voting.
出处 《计算机应用》 CSCD 北大核心 2008年第11期2827-2828,2831,共3页 journal of Computer Applications
关键词 BLS签名 基于身份盲签名 双线性对 BLS signature identity based blind signature bilinear pairing
  • 相关文献

参考文献10

  • 1CHAUM D. Blind signature for untraceable payments[ C]// Advance in Cryptology- Crypto'82. Berlin: Springer-Verlag, 1983: 199 - 203.
  • 2BONEH D, FRANKLIN M. Identity-based eneryption from the Weil pairing[ C]// Advances in Cryptology -Crypto 2001, LNCS 2139. Berlin: Springer-Verlag, 2001:213-229.
  • 3SHAMIR A. Identity-based cryptosystems and signature schemes [ C]// Advances in Cryptology- Crypto 1984, LNCS196. Berlin: Springer-Verlag, 1984:47-53.
  • 4ZHANG F, KIM K. ID-based blind signature and ring signature from pairings [ C ]// Advances in Cryptology - Asiacrypt 2002, LNCS 2501. Berlin: Springer-Verlag, 2002:533-547.
  • 5ZHANG F, KIM K. Efficient ID-based blind signature and proxy signature from bilinear pairings[ C]// Proceeding of the 13th Australasian Conference on Information Security and Privacy. Berlin: Springer-Verlag, 2003:312-323.
  • 6HUANG Z, CHEN K, WANG Y. Efficient identity-based signatures and blind signatures[ C]// Proceeding of the 4th International Conference on Cryptology and Network Security. Berlin: Springer-Vetlag, 2005:120 - 133.
  • 7GALINDO D, HERRANZ J, KILTZ E. On the generic construction of idenlity-based signatures with additional properties [ C]// Advances in Cryptology - Asiacrypt 2006, LNCS 4284. Berlin: Springer-Verlag, 2006:178 - 193.
  • 8BONEH D, LYNN B, SHACHAM H. Short signatures from the Weil pairing[ C]// Advances in Cryptology - Asiacrypt 2001, LNCS2248. Berlin: Springer-Verlag, 2001:514-532.
  • 9BOLDYREVA A. Efficient threshold signatures, muhisignatures and blind signatures based on the gap-Diffie-Hellman-group signature scheme[ C]// Proceeding of the 6th International Workshop on Theory and Practice in Public Key Cryptography. Berlin: Springer-Verlag, 2003 : 31 - 46.
  • 10BONEH D, GENTRY C, LYNN B, et al. Aggregate and verifiably encrypted signatures from bilinear maps[ C]//Advances in Cryptology-Eurocrypt 2003, LNCS 2656. Berlin: Springer-Verlag, 2003: 416 -432.

同被引文献21

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部