期刊文献+

基于双线性对的代理盲签名方案 被引量:1

A proxy blind signature scheme based on bilinear pairings
下载PDF
导出
摘要 基于Diffie-Hellman问题的困难假设和Hash函数,提出了相关双线性对的代理盲签名方案,并对所提方案进行了安全性分析。该方案通过设计简单易计算的签名密钥λ和盲化因子K,使得计算更加简便,运行更加高效,同时更好地保护用户的隐私。 Aiming at the assumption of the difficult Diffie-Hellman problems and Hash functions,a novel proxy blind signature scheme based on bilinear pairings was proposed,and its security was analyzed.In this scheme,the proxy signature key λ and the blind factor Kwere simpler compared to the up-to-date schemes.The new scheme not only achieves the security requirements of proxy blind signature,but also reduces computation complexity and improves the efficiency.
作者 贾平萍 丁勇
出处 《桂林电子科技大学学报》 2011年第4期319-321,共3页 Journal of Guilin University of Electronic Technology
基金 国家自然科学基金(60963024)
关键词 代理盲签名 双线性对 盲性 不可链接性 proxy blind signature bilinear pairings blindness unlinkability
  • 相关文献

参考文献2

二级参考文献25

  • 1王蜀洪,王贵林,鲍丰,王杰.对一个基于离散对数代理盲签名的密码分析(英文)[J].软件学报,2005,16(5):911-915. 被引量:22
  • 2Stinson DR. Crvotoaraohv Theory and Practice. 2nd ed., New York: CRC Press, 2002. 282-285.
  • 3Tan ZW, Liu ZJ. Tang CM. Digital proxy blind signature schemes based on DLP and ECDLP. Vol.21, Beijing: Key Laboratory of Mathematics Mechanization Research, Academy of Mathematics and Systems Science, the Chinese of Academy of Sciences, 2002. 212-217.
  • 4Chaum D. Blind signature systems. In: Chaum D, ed. Proceedings of the Crypto'83. New York: Springer-Vedag, 1998. 153-156.
  • 5Chaum D, Fiat A, Naor M. Untraceable electronic cash. In: Goldwasser S, ed. Proceedings of the Crypto'88. LNCS 403, New York: Springer-Vedag, 1990. 319-327.
  • 6Chaum D, Boen B, Heyst E, Mjolsnes S, Steenbeek A. Efficient off-line electronic check. In: Quisquater J. Vandewalle J, eds. Proceedings of the Eurocrypt'89. LNCS 434, Berlin: Springer-Verlag, 1990. 294-301.
  • 7Brands S. Untraceable off-line cash in wallets with observers. In: Douglas RS, ed. Proceexlings of the Crypto'93. LNCS 773, New York: Springer-Verlag, 1994. 302-318.
  • 8Mambo M, Usuda K,Okamoto E. Proxy signatures for delegating signing operation. In: Proceedings of the 3rd ACM Conference on Computer and communications Security. New Delhi: ACM Press, 1996.48-57.
  • 9Lee B, Kim H, Kim K. Strong proxy signature and its applications. In: Proceedings of the 2001 Symposium on Cryptography and Information Security (SCIS 2001). 2001.
  • 10Zhang K. Threshold proxy signature schemes. In: Okamoto E, Davida G, Mambo M, eds. Proceedings of the Information Security Workshop 1997. LNCS 1396, Berlin: Springer-Verlag, 1998. 191-197.

共引文献91

同被引文献11

  • 1Chaum D. Blind Signature for Untraceable Payments[C]// Proc. of CRYPTO'82. New York, USA: [s. n.], 1983: 199- 203.
  • 2Manbo M, Usdua K, Okamoto E. Prosy Signature: Delegation of The Power to Sign Messages[J]. IEICE Transactions on Foundations, 1996, 79(9): 1338-1353.
  • 3Lin W D, Jan J K. A Security Personal Learning Tools Using a Proxy Blind Signature Scheme[C]//Proc. ofInternational Conference on Chinese Language Computing. Washington D. C., USA: IEEE Computer Society, 2000: 273-277.
  • 4Zheng Yuliang. Digital Signcryption or How to Achieve Cost(Signature and Encryption)<<Cost(Signature) + Cost (Encryption)[C]//Proc. of the 17th Annual International Cryptology Conference on Advances in Cryptology. London, UK: Springer-Verlag, 1997: 165-179.
  • 5Fan C I, Chen W K, Yeh Y S. Randomization Enhanced Chaum's Blind Signature Scheme[J]. Computer Communications, 2000, 23(17): 1677-1680.
  • 6农强,吴顺祥.一种基于身份的代理盲签名方案的分析与改进[J].计算机应用,2008,28(8):1940-1942. 被引量:15
  • 7冀会芳,韩文报,赵龙.基于身份的签密和代理签密方案[J].信息工程大学学报,2010,11(4):458-461. 被引量:4
  • 8余丹,杨晓元,陈海滨.无证书的代理盲签名方案[J].计算机工程与应用,2011,47(13):110-112. 被引量:5
  • 9陈善学,周淑贤,姚小凤,李方伟.高效的基于身份的代理签密方案[J].计算机应用研究,2011,28(7):2694-2696. 被引量:6
  • 10张建中,彭丽慧,薛荣红.一个无证书代理盲签名方案[J].计算机工程,2011,37(14):112-113. 被引量:9

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部