期刊文献+

一种基于ElGamal签名体制的代理盲签名 被引量:4

A PROXY BLIND SIGNATURE BASED ON ELGAMAL SIGNATURE
下载PDF
导出
摘要 在密码学中,使用Hash函数必然使签名方案因Hash函数的不安全性而遭受相关攻击,从而导致签名方案的安全性降低。提出一种新的基于ElGamal签名体制的代理盲签名方案。该方案不需要使用Hash函数,避免了使用Hash函数带来的威胁;而且新方案实现了电子交易中的不可伪造性和不可链接性,有效地防止了双方事后抵赖,且计算量较低。 In cryptography, the scheme of signature using Hash functions will no doubt face interrelated attacks due to the insecurity of the function, and therefore it will result in lower security. A new proxy blind signature scheme based on the ElGamal signature system is proposed. The threat brought by the Hash function is avoided, and the unforgeability and unlinkability in electronic tractions of business is achieved. The repudiation is prevented effectively, and the computation quantity is relatively small as well.
出处 《计算机应用与软件》 CSCD 2009年第3期134-135,157,共3页 Computer Applications and Software
基金 重庆市教委科学技术研究项目(KJ060510)
关键词 代理盲签名 不可伪造性 不可链接性 Proxy blind signature Unforgeablity Unlinkability
  • 相关文献

参考文献12

  • 1Lin W D,Jan J K. A security personal learning tools using a proxy blind signature scheme. Proceedings of International Conference on Chinese Language Computing[ C ]. Illinois, USA, 2000:273 - 177.
  • 2谭作文,刘卓军,唐春明.基于离散对数的代理盲签名(英文)[J].软件学报,2003,14(11):1931-1935. 被引量:91
  • 3Hung M S, Bin T H. On the Security of Some Proxy Blind Signature Schemes [ J ]. Australasian Information Security Workshop, Dunedin: Australian Computer Society press,2004:75 - 78.
  • 4Wang S B, Hong F, Cui G H. Secure Efficient Proxy Blind Signature Schemes Based DLP [ C ]. Proceedings of the Seventh IEEE International Conference on E-Commerce Technology. 2005:452-455.
  • 5夏满民,谷利泽.一种新型的代理盲签名方案[J].北京邮电大学学报,2006,29(3):48-52. 被引量:17
  • 6黄文平.一些不需要安全通道代理签名的分析与改进[J].计算机工程与应用,2005,41(28):127-130. 被引量:6
  • 7Chien H Y. Forgery attacks on multi-signature schemes for authenticating mobile code delegates [ J ]. IEEE Transactions on vehicular Technology,2002,51 (6) : 1669 - 1671.
  • 8Dobbertin H. The status of MD5 after a recent attack [ J ]. Crypto - Bytes. 1996,2(2) :1 -6.
  • 9Chaum D. Blind signature for untraceable payments. In: Proc of the Crypto' 82 [ C ]. New York : Springer-Verlag, 1983 : 199 - 203.
  • 10Stadler M, Piveteau J, Camenish J. Fair Blind Signatures. In : Advances in Cryptology-Eurocrypt ' 95 [ R ]. Springer-Verlga, 1995:209 - 219.

二级参考文献42

  • 1谷利泽,李中献,杨义先.不需要可信任方的匿名代理签名方案[J].北京邮电大学学报,2005,28(1):48-50. 被引量:24
  • 2邱慧敏,杨义先,胡正名,周锡增.一种基于ElGamal数字签名的双向用户鉴别方案[J].北京邮电大学学报,2005,28(3):100-102. 被引量:9
  • 3Stinson DR. Crvotoaraohv Theory and Practice. 2nd ed., New York: CRC Press, 2002. 282-285.
  • 4Tan ZW, Liu ZJ. Tang CM. Digital proxy blind signature schemes based on DLP and ECDLP. Vol.21, Beijing: Key Laboratory of Mathematics Mechanization Research, Academy of Mathematics and Systems Science, the Chinese of Academy of Sciences, 2002. 212-217.
  • 5Chaum D. Blind signature systems. In: Chaum D, ed. Proceedings of the Crypto'83. New York: Springer-Vedag, 1998. 153-156.
  • 6Chaum D, Fiat A, Naor M. Untraceable electronic cash. In: Goldwasser S, ed. Proceedings of the Crypto'88. LNCS 403, New York: Springer-Vedag, 1990. 319-327.
  • 7Chaum D, Boen B, Heyst E, Mjolsnes S, Steenbeek A. Efficient off-line electronic check. In: Quisquater J. Vandewalle J, eds. Proceedings of the Eurocrypt'89. LNCS 434, Berlin: Springer-Verlag, 1990. 294-301.
  • 8Brands S. Untraceable off-line cash in wallets with observers. In: Douglas RS, ed. Proceexlings of the Crypto'93. LNCS 773, New York: Springer-Verlag, 1994. 302-318.
  • 9Mambo M, Usuda K,Okamoto E. Proxy signatures for delegating signing operation. In: Proceedings of the 3rd ACM Conference on Computer and communications Security. New Delhi: ACM Press, 1996.48-57.
  • 10Lee B, Kim H, Kim K. Strong proxy signature and its applications. In: Proceedings of the 2001 Symposium on Cryptography and Information Security (SCIS 2001). 2001.

共引文献102

同被引文献31

  • 1郑卓,陆洪文.一种基于双线性对的新型门限盲签名方案[J].计算机工程与应用,2005,41(34):114-116. 被引量:7
  • 2夏满民,谷利泽.一种新型的代理盲签名方案[J].北京邮电大学学报,2006,29(3):48-52. 被引量:17
  • 3Chaum D.Blind signature for untraceable payments[A].Proc.Crypto' 82[C].New York:Henum Press,1983:199-203.
  • 4姚亦峰 朱华飞 陈抗生.基于二元放射变换的广义ELGamal型盲签名方案.电子学报,2000,(7).
  • 5陈明 葛永亮.浅谈盲签名.计算机与信息技术,2007,(31).
  • 6Mambo M, Usuda K, Okamoto E. Proxy Signature: Delegation ofthe Power to Sign Messages[EB/OL]. (1996-09-15). http:// citeseerx.ist.psu.edu/viewdoc/download?doi= 10.1.1.14.8266.
  • 7Chaum D. Blind Signatures for Untraceable Payments[C]//Proc. of Advances in Cryptology Crypto'82. New York, USA: Plenum Press, 1983.
  • 8Jan J K. A Security Personal Learning Tools Using a Proxy Blind Signature Scheme[C]//Proc. of International Conference on Chinese Language Computing. [S. 1.]: IEEE Press, 2000.
  • 9Riyami S, Paterson K. Certificateless Public Key Cryptogra- phy[EB/OL]. (2003-10-2l). http://citeseerx.ist.psu.edu/viewdoc/ download?doi= 10.1.1.81.
  • 10Chaum D.Blind signatures for untraceable payments[C]//Advances in Cryptology Crypto’82.Berlin:Springer-Verlag,1983:199-203.

引证文献4

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部