期刊文献+

基于身份的门限多代理多盲签名方案 被引量:5

Identity-based threshold multi-proxy blind multi-signature scheme
下载PDF
导出
摘要 为了提高代理盲签名的实用性和灵活性,结合基于身份的密码体制和秘密共享技术,提出了基于身份的门限多代理多盲签名方案。在该方案中,原始群和代理群的管理员通过分发共享秘密来控制群成员的行为,在群成员获得共享秘密后,一定数量的原始签名者合作可以进行授权,一定数量的代理签名者合作可以产生签名。该方案解决了多个代理签名者代表多个原始签名者进行盲签名的问题,经分析得知,方案同时具有代理签名、盲签名和门限签名所具有的安全性质,如不可伪造性、不可否认性、盲性、不可追踪性和鲁棒性等。 In order to improve the practicality and flexibility of proxy blind signature,this paper proposes an identity-based threshold multi-proxy blind multi-signature scheme by adopting identity-based cryptography and secret sharing scheme.In this scheme,the administrators of the original group and proxy group can control the behavior of their members by distributing the shared secrets.After original signers and proxy signers obtain the shared secrets,some original signers can cooperatively delegate their signing capability to proxy signers,and some proxy signers can cooperatively generate threshold multi-proxy blind multi-signature.The scheme solves how to generate blind signature while multiple proxy signers sign the message on behalf of multiple original signers.By analyzing the scheme,it is concluded that the scheme has many security properties,such as unforgeability,nonrepudiation,blindness,untraceability,robustness etc.
作者 杨长海
出处 《计算机工程与应用》 CSCD 北大核心 2010年第18期121-124,共4页 Computer Engineering and Applications
关键词 基于身份 盲签名 代理签名 门限签名 多代理多盲签名 identity-based blind signature proxy signature threshold signature multi-proxy blind multi-signature
  • 相关文献

参考文献5

  • 1Chaum D.Blind signature for untraceable payments[C]//Advanees in Crypto' 82.New York : Plenum Press, 1983 : 199-203.
  • 2Lin W D,Jan J K.A security personal learning tools using a proxy blind signature scheme[C]//Proc of International Conference on Chinese Language Computing.USA:Chinese Language Computer Society Knowledge Systems Institute,2000: 273-277.
  • 3Lu Rong-xing,Cao Zhen-fu.Proxy blind multi-signature scheme without a secure channel[J].Applied Mathematics and Computation, 2005,164( 1) : 179-187.
  • 4王勇兵,姬龙涛,张建中.多代理盲签名方案的设计[J].云南师范大学学报(自然科学版),2008,28(1):26-30. 被引量:3
  • 5Ming Yang Wang Yumin.A NEW EFFICIENT ID-BASED PROXY BLIND SIGNATURE SCHEME[J].Journal of Electronics(China),2008,25(2):226-231. 被引量:2

二级参考文献11

  • 1D. Chaum.Blind signatures for untraceable payments[].Advances in Cryptology-Crypto’.1983
  • 2M. Mambo,,K. Usuda,,and E. Okamoto.Proxy sig-natures: Delegation of the power to sign messages[].IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences.1996
  • 3M. Mambo,,K. Usuda,,and E. Okamoto.Proxy sig- natures for delegating signing operation[].Proceedings of the rd ACM Conference on Computer and Communications Security-CCS’.1996
  • 4S. Kim,,S. Park,,and D. Won.Proxy signatures, re- visited[].Proceedings of the first International Con- ference on Information and Communications Secu- rity-ICICS’.1997
  • 5T. Okamoto,,M. Tada,,and E. Okamoto.Extended proxy signatures for smart cards[].Proceedings of the nd International Information Security Work- shop-ISW’ November –.6–71999
  • 6S. D. Galbraith,,K. Harrison,and D. Soldera.Im- plementing the Tate pairing[].Proceedings of the th International Algorithmic Number Theory Sympo- sium-ANTS-V’.2002
  • 7A. Shamir.Identity-based cryptosystems and signa- ture schemes[].Advances in Cryptology-Crypto’.1984
  • 8Z. Tan,Z. Liu,and C. Tang.Digital proxy blind signature schemes based on DLP and ECDLP[].MM Research Preprints.2002
  • 9A. K. Awasthi,and S. Lal.Proxy blind signature scheme[].JFCR Trans on Cryptology.2005
  • 10H. M. Sun,,B. T. Hsieh,,and S. M. Tseng.On the security of some proxy signature schemes[].Journal of System and Software.2005

共引文献3

同被引文献29

引证文献5

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部