期刊文献+

基于身份的代理盲签名方案分析与改进 被引量:5

Analysis and Improvement of Identity-based Proxy Blind Signature Scheme
下载PDF
导出
摘要 通过对一种基于身份的代理盲签名方案的分析,指出该方案并不满足不可伪造性,代理人通过计算原始签名人的私钥,可以伪造原始签名人的签名或任何授权,且原方案有关签名盲性的证明存在错误。在此基础上提出一种改进的代理盲签名方案,克服了原方案的安全缺陷,有效防止代理人恶意的伪造攻击,且保留了原方案的其他优点。 The identity-based proxy blind signature scheme proposed is analyzed,and it is found that their scheme does not possess the unforgeability property.Because the proxy signer can recover the original signer’s private key,one can forge the signing capabilities of the original signer.At the same time,it is found there is mistake about the process of proving their signature scheme satisfying blindness.An improved proxy blind signature scheme is proposed,which can resolve the security problems existing in the original scheme.Analysis indicates that improved proxy blind signature scheme is secure against the proxy signer’s forgery attack,and remains other merit of the original scheme.
出处 《计算机工程》 CAS CSCD 北大核心 2010年第16期110-112,共3页 Computer Engineering
基金 2008年国家建设部科研基金资助项目(2008K950)
关键词 基于身份 代理盲签名 不可伪造性 identity-based proxy blind signature unforgeability
  • 相关文献

参考文献10

  • 1Chaum D.Blind Signatures for Untraceable Payments[C] //Proc.of Advances in Cryptology-Crypto'82.Berlin,Germany:[s.n.] ,1982.
  • 2Mambo M,Usuda K,Okamoto E.Proxy Signature:Delegation of the Power to Sign Messages[Z].(1996-08-23).http://ci.nii.ac.jp/ naid/110003216223.
  • 3Jan J K.A Security Personal Learning Tools Using a Proxy Blind Signature Scheme[C] //Proc.of International Conference on Chinese Language Computing.Illinois,USA:[s.n.] ,2000.
  • 4Tan Zuowen,Liu Zhuojun.Digital Proxy Blind Signature Schemes Based on DLP and ECDLP[Z].(2002-12-21).http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.88.2652&rep=rep1&type=pdf.
  • 5Lal S,Awasthi A K.Proxy Blind Signature Scheme[Z].(2003-07-16).http://eprint.iacr.org/2003/072/.
  • 6Shamir A.Identity-based Cryptosystems and Signature Schemes[C] // Proc.of Advances in Cryptology-Crypto'84.[S.l.] :Springer-Verlag,1984.
  • 7Zheng Dong.ID-based Proxy Blind Signature[C] //Proc.of ANNA'04.[S.l.] :IEEE Press,2004.
  • 8Lang W M.A New Efficient ID-based Proxy Blind Signature Scheme[C] //Proc.of ISSC'04.[S.l.] :IEEE Press,2004.
  • 9张学军,王育民.高效的基于身份的代理盲签名[J].计算机应用,2006,26(11):2586-2588. 被引量:16
  • 10Zhang Fangguo,Kim K.ID-based Blind Signature and Ring Signature from Pairings[C] //Proc.of the 8th International Conference on the Theory and Application of Cryptology and Information Security.London,UK:[s.n.] ,2002.

二级参考文献12

  • 1王蜀洪,王贵林,鲍丰,王杰.对一个基于离散对数代理盲签名的密码分析(英文)[J].软件学报,2005,16(5):911-915. 被引量:22
  • 2MAMBO M, USUDA K, OKAMOTO E. Proxy signature: delegation of the power to sign messages[ J]. IEICE Transactions on Fundamentals, 1996, E792A(9): 1338-1353.
  • 3CHAUM D . Blind signature for untraceable payments [ A ] .Advances in Cryptology: Crypto'82[ C]. Berlin, 1982. 199 -203.
  • 4AWASTHI AK, LAL S. Proxy blind signature scheme[ J]. JFCR Transaction on Cryptology, 2005, 2( 1 ) : 5 - 11.
  • 5SHAMIR A . Identity - based cryptosystems and signature schemes[A]. Crypto'84, LNCS 196[C], Berlin, 1984.47-53.
  • 6BONEH D, FRANKLIN M. Identity-based encryption from the weil pairing[ A]. Crypto 2001, LNCS 2139[ C], 2001. 213 - 229.
  • 7BONEH D, LYNN B, SHACHAM H. Short signature from the weil pairing[ A]. Asiacrypt 2001, LNCS 2248[ C], 2001. 514 -532.
  • 8ZHENG D, HUANG Z, CHEN KF, et al. ID-based proxy blind signature[ A]. ANNA 2004[ C]. IEEE Computer Society, 2004, 2.380 - 383.
  • 9LANG WM, TAN YM, YANG ZK et al. A new efficient ID-based proxy blind signature scheme[ A]. ISCC 2004[ C]. IEEE Computer Society, 2004, 1. 407-411.
  • 10HESS F. Efficient identity based signature schemes based on pairings[ A]. SAC 2002, LNCS 2596[ C], 2003. 310 - 324.

共引文献15

同被引文献46

  • 1王蜀洪,王贵林,鲍丰,王杰.对一个基于离散对数代理盲签名的密码分析(英文)[J].软件学报,2005,16(5):911-915. 被引量:22
  • 2李素娟,张福泰.基于ID的代理盲签名[J].计算机工程,2006,32(17):203-204. 被引量:8
  • 3张学军,王育民.高效的基于身份的代理盲签名[J].计算机应用,2006,26(11):2586-2588. 被引量:16
  • 4ZHANG Qing,WEN Qiaoyan,CHEN Gengli.Efficient ID-Based Proxy Blind Signature Scheme[J].Wuhan University Journal of Natural Sciences,2007,12(1):105-108. 被引量:2
  • 5Shamir A. ID-based Cryptosystems and Signature Schemes[C] // Proc. of CRYPTO’84. New York, USA: [s. n.] , 1984.
  • 6Huang Zhenjie, Chen Kefei, Wang Yuming. Efficient Identity- based Signatures and Blind Signatures[C] //Proc. of CANS’05. Berlin, Germany: [s. n.] , 2005.
  • 7Zhang Fangguo, Kim K. ID-based Blind Signature and Ring Signature from Pairings[C] //Proc. of ASIACRYPT’02. Berlin, Germany: [s. n.] , 2002.
  • 8Chuam D.Blind signatures for untraceable payments[C]//Advanc- es in Cryptology-Crypto'82,Berlin, 1982:199-203.
  • 9Mambo M,Usuda K, Okamoto E.Proxy signature:delegation of the power to sign messages[J].IEICE Transactions on Funda- mentals, 1996,E792A(9) : 1338-1353.
  • 10Zhang K.Threshold proxy signatuer schemes[C]//1997 Informa- tion Security Workshop, Japan, 1997:191-197.

引证文献5

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部