期刊文献+

一个代理盲签名方案的分析与改进 被引量:3

Analysis and improvement of a proxy blind signature
下载PDF
导出
摘要 通过对黄辉等人提出的代理盲签名方案的分析,指出该方案不满足不可伪造性,原始签名者和签名接收者都可以伪造代理签名者的盲签名。针对这些安全缺陷,提出了一种改进的代理盲签名方案。新方案克服了原方案中存在的代理盲签名伪造问题,且满足完整性、不可伪造性、可验证性及强盲性等安全特性。结果表明,新方案比原方案具有更高的安全性和实用性,可应用于电子现金等领域。 After analyzing a proxy blind signature scheme proposed by Huang et al.,it was pointed out that the scheme was insecure against the original signer and signature receiver's forgery attack.To overcome the security problems existing in Huang's scheme,an improved proxy blind signature scheme was proposed.The new scheme resolved forgery attack in the former scheme and met the security requirement of proxy blind signature scheme.The analytical results prove that the new scheme is more secure and practicable,and suitable for electronic cash.
出处 《计算机应用》 CSCD 北大核心 2011年第4期989-991,共3页 journal of Computer Applications
基金 国家自然科学基金资助项目(61071116) 国家科技重大专项资助项目(2009ZX03001-004-02) 重庆市发改委高技术产业技术开发项目(20091537) 重庆市教委科学技术研究项目(KJ060510)
关键词 代理签名 盲签名 代理盲签名 离散对数 伪造攻击 proxy signature blind signature proxy blind signature discrete logarithm forgery attack
  • 相关文献

参考文献10

  • 1CHAUM D. Blind signature for untraceable payments[ C ]//CRYPTO'82: Advances in Cryptology. New York: Springer-Verlag, 1983:199-203.
  • 2MAMBO M, USUDA K, ODAMOTO E. Proxy signature: delegation of the power to sign messages[ J ]. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences, 1996, E79(9) : 1338 - 1354.
  • 3胡兰兰,郑康锋,李剑,胡正名,杨义先.一种改进的椭圆曲线安全代理签名方案[J].计算机应用研究,2010,27(2):685-688. 被引量:6
  • 4LIN W D, JAN J K. A security personal learning tools using a proxy blind signature scheme [ C ]// Proceedings of International Conference on Chinese Language Computing. Washington, DC: IEEE Computer Society, 2000:273-277.
  • 5谭作文,刘卓军,唐春明.基于离散对数的代理盲签名(英文)[J].软件学报,2003,14(11):1931-1935. 被引量:91
  • 6LI JI-GUO, WANG SHU-HONG. New efficient proxy blind signature scheme using verifiable self-certified public key [ J ]. International Journal of Network Security, 2007, 1 (2) : 193 - 200.
  • 7TAN ZUOWEN, LIU ZHUOJUN, TANG CHUNMING. Digital proxy blind signature schemes based on DLP and ECDLP [ J ]. MM Research Preprints, 2002, 21 (7) : 212 - 217.
  • 8AWASTHE A K, LAL S. Proxy blind signature scheme [ J ]. Journal of Transaction on Cryptology, 2005, 2(1): 5-ll.
  • 9黄辉,秦静,李丽.一个改进的代理盲签名方案[J].计算机应用,2007,27(6):1539-1541. 被引量:6
  • 10CHANG M H, CHEN I T, CHEN M T. Design of proxy signature in ECDSA [ C ]// Proceedings of the 8th International Conference on Intelligent Systems Design and Applications. Kaohsiung, Taiwan: [s.n.], 2008: 17-22.

二级参考文献40

  • 1吴旭辉,沈庆浩.一种代理多签名体制的安全性分析[J].通信学报,2005,26(7):119-122. 被引量:6
  • 2曹天杰,林东岱,薛锐.基于椭圆曲线的代理多签名方案的安全性分析[J].小型微型计算机系统,2006,27(5):798-801. 被引量:7
  • 3左为平,李海峰.一种安全的椭圆曲线代理签名方案[J].佳木斯大学学报(自然科学版),2007,25(4):495-497. 被引量:5
  • 4MAMBO M, USUDA K, OKAMOTO E. Proxy signature: delegation of the power to sign messages[ J]. IEICE Trans on Fundamentals of Electronics Communications and Computer Sciences, 1996, E79A(9) : 1338-1354.
  • 5SHAO Zu-hua. Proxy signature schemes based on factoring[ J]. Information Processing Letters, 2003,85 (3) : 137-143.
  • 6LEE B, KIM H, KIM K. Strong proxy signature and its applications [ C]//Proc of Symposium on Cryptography and Information Security. Oiso, Japan :[ s. n. ], 2001:603-608.
  • 7KOBLITZ N. Elliptic curve cryptosystems [ J ]. Mathematics of Computation, 1987,48 ( 1 ) : 203- 209.
  • 8MILLER V S. Use of elliptic curve in cryptography[ C]//Proc of Advances in Cryptology-Crypto' 85. New York : Springer-Verlag, 1986 : 417-426.
  • 9CAELLI W J, DAWSON E P, REA S A. PKI, elliptic curve cryptography, and digital signatures [ J ]. Computers and Security, 1999, 18(1) : 47-66.
  • 10CHEN T S, LIU T P, HWANG G S, et al. An improvement of proxyprotected proxy multi-signature scheme [ C ]//Proc of the 13th International Conference on Information Management. 2002:33-40.

共引文献98

同被引文献24

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部