期刊文献+

对一种部分盲签名方案的安全性分析与改进 被引量:9

Security analysis and improvement of a partially blind signature scheme
下载PDF
导出
摘要 最近崔巍等人提出了一个高效的基于身份的部分盲签名方案(崔-辛方案)。首先指出了在崔-辛方案中请求者能非法修改事先已协商好的公共信息,并讨论了出现这种伪造攻击的原因。然后针对崔-辛方案的安全缺陷提出了一个改进方案,并严格证明了它的不可伪造性。最后将所提方案与现有方案进行了性能比较,比较结果显示所提方案是一个效率较高的基于身份的部分盲签名方案。 Recently, an efficient identity-based partially blind signature scheme was put fonvard by Cui and Xin et al. First of all, it was pointed out that Cui-Xin's scheme suffered from the forgery attack in which a requester could change the pre-agreed common information illegally', and the reason why Cui-Xin's scheme could not resist the forgery attack was discussed. Secondly, an improved scheme was put forth to overcome the security flaw of Cui-Xin's scheme, and it was strictly proved to be unforgeable. Compared with the existing schemes, the results show that the proposed scheme is an efficient identity-based partially blind signature scheme.
出处 《计算机应用》 CSCD 北大核心 2010年第10期2687-2690,共4页 journal of Computer Applications
基金 国家自然科学基金资助项目(60872055) 河北省教育厅科研计划资助项目(2009204)
关键词 部分盲签名 基于身份 安全模型 不可伪造性 双线性映射 partially signature identity-based security model unforgebility bilinear map
  • 相关文献

参考文献15

  • 1CHAUM D. Blind signatures for untraceable payments[ C]// Proceedings of the Crypto 1982. New York: Plenum Press, 1983:199 - 203.
  • 2ABE M, FUJISAKI E. How to date blind signatures[ C]//Proceedings of the ASIACRYPT 1996, LNCS 1163. Berlin: Springer-Verlag, 1996:244-251.
  • 3CHOW S S M, HUI L C K, YIU S M, et al. Two improved partially blind signature schemes from bilinear pairings[ C]// ACISP 2005: Proceedings of the 10th Australasian Conference on Information Security and Privacy, LNCS 3574. Berlin: Springer-Verlag, 2005:316 -328.
  • 4BARRETO P S L M, LIBERT B, MCCULLAGH N, et al. Efficient and provably-secure identity-based signatures and signcryption from bilinear maps[ C]//Proceedings of the ASIACRYPT 2005, LNCS 3788. Berlin: Springer-Verlag, 2005:515-532.
  • 5崔巍,辛阳,胡程瑜,杨义先,李忠献.高效的基于身份的(受限)部分盲签名[J].北京邮电大学学报,2008,31(4):53-57. 被引量:20
  • 6HU X, HUANG S. An efficient ID-based partially blind signature scheme[ C]//SNPD 2007: Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing. Washington, DC: IEEE Computer Society, 2007, 3:291-296.
  • 7张学军,王育民.高效的基于身份的部分盲签名[J].计算机工程与应用,2007,43(11):211-212. 被引量:11
  • 8CHA J C, CHEON J H. An identity-based signature from gap Diffie- Hellman groups[ C]// PKC 2003: Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography, LNCS2567. Berlin: Springer-Verlag, 2003:18-30.
  • 9TSENG Y-M, WU T-Y, WU J-D. On tbe security of an efficient ID- based partially blind signature scheme[ C]//IMECS 2008: Proceedings of the International MultiConference of Engineers and Computer Scientists 2008. Hong Kong: [ s. n. ] 20O8,1:417 -420.
  • 10闫东升.一个新的高效的基于身份的部分盲签名方案[J].计算机工程与应用,2008,44(2):137-139. 被引量:16

二级参考文献21

  • 1张学军,王育民.高效的基于身份的部分盲签名[J].计算机工程与应用,2007,43(11):211-212. 被引量:11
  • 2Chaum D.Blind signature for untraceable payments[C]//Crypto'82.New York:Prenum Publishing Corporation,1982:199-204.
  • 3Abe M,Fujisaki E.How to date blind signatures[C]//Asiacrypt96.Berlin:Springer-Verlag,1996:244-251.
  • 4Abe M,Okamoto T.Provably secure partially blind signautres[C]//Crypto2000.Berlin:Springer-Verlag,2000:271-286.
  • 5Maitland G,Boyd C.A provably secure restrictive partially blind signature scheme[C]//PKC 2002.Berlin:Springer-Verlag,2002:99-114.
  • 6Shamir A.Identity-based cryptosystems and signature schemes[C]//Crypto ' 84,Berlin,1984:47-53.
  • 7Boneh D,Franklin M.Identity-based encryption from the weil pairing[C]//Crypto 2001.Berlin:Springer-Verlag,2001:213-229.
  • 8Boneh D,Lynn B,Shacham H.Short signature from the weil pairing[C]//Asiacrypt2001.Berlin:Springer-Verlag,2001:514-532.
  • 9Chow S S M,Hui L C K,Yiu H S M,et al.Two improved partially blind signature schemes from bilinear pairings[EB/OL].http://eprint.iacr.org/2004/108.pdf.
  • 10Chaum D.Blind signature for untraceable payments[C]//Crypto'82.New York:Plenum Publishing Corporation,1982:199-203.

共引文献30

同被引文献100

  • 1张小萍,于静洋,梁斌梅.改进的基于身份的盲签名[J].计算机工程与设计,2006,27(21):4123-4124. 被引量:2
  • 2张学军,王育民.新的基于身份无可信中心的盲签名和代理签名[J].计算机工程与应用,2007,43(1):142-144. 被引量:12
  • 3张学军,王育民.高效的基于身份的部分盲签名[J].计算机工程与应用,2007,43(11):211-212. 被引量:11
  • 4Okamoto T. Efficient blind and partially blind signatures without random oracles [G]. LNCS 3876: New York: Proceedings of Theory of Cryptography, 2006: 80-99.
  • 5WU Q, Susilo W, MET Y. Efficient partially blind signatures with provable security [G]. LNCS 3982: New York: Proceedings of ICCSA, 2006: 345-354.
  • 6HU X, HUANG S. An efficient ID-based partially blind signa- ture scheme [C]. Proceedings of SNPD. Washington: IEEE Computer Society, 2007: 291-296.
  • 7Majhi B, Sahu D K, Subudhi R N. An efficient ID based proxy signature, proxy blind signature and proxy partial blind signa- ture [C]. Proceedings of ICIT. Washington: IEEE Computer Society, 2008: 19-23.
  • 8QIU W, GONG Z, LIU B, et al. Restrictive partially blind sig- nature for resource-constrained information systems [J]. Knowl InfSyst, 2011, 26 (1): 87-103.
  • 9CHAUM D. Blind signatures for untraceable payments [ C ]//Proc of CRYPTO 1982. New York: Plenum Press, 1983 : 199-203.
  • 10ABE M, FUJISAKI E. How to date blind signatures [ C ]//Proc of ASIACRYPT 1996. Berlin : Springer-Verlag, 1996 : 244 - 251.

引证文献9

二级引证文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部