期刊文献+

多重代理盲签名分析 被引量:3

Analysis of Multi-proxy Blind Signature
下载PDF
导出
摘要 多重代理盲签名是代理盲签名的延伸,被授权的代理签名者代替多个原始签名者进行签名。采用构造方法,分析一个不需要安全渠道的多重代理盲签名方案的安全性,结果证明其不安全,不满足不可伪造性和不可链接性,不能用于电子商务、电子货币、电子投票等系统。 A multi-proxy blind signature is an extension of proxy blind signature,which allows the designated proxy signer to generate a signature on behalf of several original signers.The security of a proxy blind multi-signature scheme without a secure channel is analyzed with the method of construction.The results show that this proxy blind signature scheme is not secure.The scheme does not satisfy the properties of unforgeability and unlinkbility.It can not be applied to e-commerce,e-cash and e-voting system.
出处 《计算机工程》 CAS CSCD 北大核心 2010年第8期130-131,共2页 Computer Engineering
基金 国家自然科学基金资助项目(10871205)
关键词 代理签名 盲签名 多重代理 proxy signature blind signature multi-proxy
  • 相关文献

参考文献6

  • 1Chaum D.Blind Signature for Untraceable Payments[C]//Proc.of Crypto'82.New York,USA:Plenum Press,1983:199-203.
  • 2Mambo M,Usuda K,Okamoto K.Proxy Signature:Delegation of the Power to Sign Message[J].IEICE Trans.on Fundamental,1996,E79-A(9):1338-1353.
  • 3Lu Rongxing,Cao Zhenfu,Zhou Yuan.Proxy Blind Multi-signature Scheme Without a Secure Channel[J].Applied Mathematics and Cumputation,2005,164(1):179-187.
  • 4Wu Lin-Chuan,Yeh Yi-Shiung,Liu Tsann-Shyong.Analysis of Sun et al.'s Linkability Attack on Some Proxy Blind Signature Shemes[J].System Software,2006,79(2):176-179.
  • 5Sun Hungmin,Hsieh B T,Tseng S M.On the Security of Some Proxy Blind Signature Scheme[J].System Software,2005,74(3):297-302.
  • 6Tan Zuowen,Liu Zhuojun,Tang Chunming.Digital Proxy Blind Signature Schemes Based on DLP and ECDLP[J].MM Research Preprints,2002,(21):212-217.

同被引文献20

  • 1谷利泽,张胜,杨义先.代理盲签名方案及其在电子货币中的应用[J].计算机工程,2005,31(16):11-13. 被引量:19
  • 2Chaum D.Blind Signature for Untraceable Payments[C] //Proc.of Crypto'82.New York,USA:Plenum Press,1983:199-203.
  • 3Mambo M,Usuda K,Oksmoto K.Proxy Signature:Delegation of the Piower to Sign Message[J].IEICE Trans on Fundam,1996,79(9):1338-1353.
  • 4Lu Rougxing,Cao zhenfu,Zhou Yuan.Proxy Blind Multi-signature Scheme without a Secure Channel[J].Applied Mathematics and Cumputation,2005,164(1):179-187.
  • 5Chaum D. Untraceable Electronic Mail, Return Addresses and Digital Pseudonyms[J]. Communications of ACM, 1981, 24(2): 84-88.
  • 6Clarkson M R, Chong S, Myers A C. Civitas: Toward a Secure Voting System[C]//Proc. of 2008 IEEE Symposium on Security and Privacy. [S. 1.]: IEEE Press, 2008.
  • 7Fujioka A, Okamoto T. A Practical Secret Voting Scheme for LargeScale Elections[C]//Proc. of Workshop on the Theory and Application of Cryptographic Techniques. London, UK: SpringerVerlag, 1992.
  • 8Vcnkitasubramaniam P, Tong Lang. Anonymous Networking with Minimum Latency in Multihop Networks[C]//Proc. of 2008 IEEE Symposium on Security and Privacy. [S. 1.]: IEEE Computer Society, 2008.
  • 9王育民,张彤,黄继武.信息隐藏-理论与技术[M].北京:清华大学出版社,2006.
  • 10Chaum D. Blind Signatures for Untraceable Payments[A].Plenum,USA:[s.n.],1983.199-203.

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部