期刊文献+

2个代理盲签名方案的安全性分析

Security Analysis of Two Proxy Blind Signature Schemes
下载PDF
导出
摘要 对基于双线性对的无证书代理盲签名方案和基于离散对数的高效代理盲签名方案进行安全性分析,指出2个方案均存在伪造攻击,任何人在得到一个有效的代理盲签名后都可以对任意消息进行伪造并通过签名验证,同时指出2个代理盲签名均不满足不可链接性,代理签名人可以将其保留的签名信息同公开后的签名消息进行对应,从而证明2个方案均是不安全的。 In this paper,a certificateless proxy blind signature based on bilinear pairings and an efficient proxy blind signature based on discrete logarithm are analyzed on security.There are forgeries in both schemes that any one who has a valid proxy blind signature can forge any message else,and the two schemes do not meet the needs of unlinkability,the proxy signer can link the public signature with the information retained by himself.Wherefore neither of the schemes is secure.
出处 《计算机工程》 CAS CSCD 北大核心 2011年第16期145-146,154,共3页 Computer Engineering
基金 北京市自然科学基金资助项目(4063040)
关键词 无证书代理盲签名 不可伪造性 不可链接性 密钥产生中心 certificateless proxy blind signature unforgeability unlinkability Key Generation Center(KGC)
  • 相关文献

参考文献9

  • 1张建中,魏春艳.一种新的无证书代理签名方案[J].计算机工程,2010,36(10):168-169. 被引量:16
  • 2陈海滨,杨晓元,梁中银,吴旭光.一种无证书的前向安全代理签名方案[J].计算机工程,2010,36(2):156-157. 被引量:8
  • 3赵泽茂,刘凤玉.代理盲签名方案的构造方法及其推广(英文)[J].应用科学学报,2005,23(3):230-234. 被引量:8
  • 4Yu Meisheng,Wu Xiaojuan,Guan Jian,et al.A Certificateless Proxy Blind Signature Scheme. Proc.of World Congress onSoftware Engineering .
  • 5Yang Xuan.An Efficient Proxy Blind Signature Scheme Based on DLP. Proc.of International Conference on Embedded Softwareand Systems . 2008
  • 6Lin W D,Jan J K.A security personal learning tools using a proxy blind signature scheme. Proceedings of International Conference on Chinese Language Computing . 2000
  • 7Tan Z,Liu Z,Tang C.Digital proxy blind signature schemes based on DLP and ECDLP. MM Research Preprints, No.21 . 2002
  • 8Awasthi A.K,Lal S.Proxy blind signature scheme. JFCR Transaction on Cryptology . 2005
  • 9Al-Riyami SS,Paterson KG.Certificateless public key cryptography. Advances in Cryptography-Asiacry-pt’03 . 2003

二级参考文献16

  • 1吴问娣,曾吉文.一种无证书的环签名方案和一个基于身份的多重签名方案[J].数学研究,2006,39(2):155-163. 被引量:15
  • 2Al-Riyami S S, Paterson K G Certificateless Public Key Cryptography[C]//Proc. of Asia-CRYPT'03. Berlin, Germany: Springer-Verlag, 2003: 452-273.
  • 3Huang Xinyi, Susilo W, Mu Yi. On the Security of Certificatgless Signature Schemes from AsiaCRYPT 2003[C]//Proc. of CANS'05. Berlin, Germany: Springer-Verlag, 2005: 126-139.
  • 4Mambo M, Usuda K, Okamoto E. Proxy Signatures for Delegating Signing Operation[C]//Proc. of the 3rd ACM Conference-on Computer and Communications Security. New York USA: ACM Press, 1996: 48-57.
  • 5Anderson R. Invited LecttLre[C]//Proc. of the 4th ACM Conference on Computer and Communications Security. Zurich, Switzerland: [s. n.], 1997: 1-7.
  • 6Bellare M, Miner S K. A Forward Secure Digital Signature Scheme[C]//Proc. of CRYPTO'99. Berlin, Germany: Springer- Verlag, 1999:431-448.
  • 7Ohta K, Okamoto T. A Digital Multisignature Scheme Based on the Fiat Shamir Scheme[C]//Proc. of Asia-CRYPT'91. Berlin, Germany: Springer-Verlag, 1991: 139-148.
  • 8Al-Riyami S S,Paterson K G.Certificateless Public Key Cryptography[C]//Proc.of Cryptology-ASIANCRYPT'03.Berlin,Germany:Springer-Verlag,2003:452-473.
  • 9Gorantla M C,Saxena A.An Efficient Certificateless Signature Scheme[C]//Proc.of the CIS'05.Berlin,Germany:Springer-Verlag,2005:110-116.
  • 10Chen Xiaofeng,Zhang Fangguo,Kim K.A New ID-based Group Signature Scheme from Bilinear Pairings[C]//Proc.of WISA'03.Berlin,Germany:Springer-Verlag,2003:585-592.

共引文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部