期刊文献+

一种前向安全的无证书代理盲签名方案 被引量:5

Forward secure certificateless proxy blind signature scheme
下载PDF
导出
摘要 为了解决密钥泄漏问题,提出一种前向安全的无证书代理盲签名方案,采用密钥不断更新的方法,保证了代理盲签名方案的前向安全性。当代理签名者的代理密钥泄漏后,以前所产生的代理盲签名依然有效,从而减少了密钥泄漏对系统带来的损失。同时该方案采用了无证书公钥密码体制,避免了基于证书密码系统的证书管理问题,解决了基于身份的密钥托管问题。 In order to solve the key exposure problem,a forward secure certificateless proxy blind signature scheme is proposed.This new scheme is forward secure by updating secret key frequently.When the proxy signature secret key is stolen, the former proxy blind signature still is available.And then it can reduce the loss,which is caused by the key exposure to a great extent.Based on certificateless public cryptosystem,it also overcames the problem of the certificate management in the certificate-based public key cryptosystem and the inherent key escrow problem in the identity-based public key cryptosystem.
出处 《计算机工程与应用》 CSCD 北大核心 2011年第34期95-97,167,共4页 Computer Engineering and Applications
基金 国家自然科学基金(No.60842006) 陕西省自然科学基金(No.2010JM8034) 武警工程学院基础基金研究项目(No.WJY201027)~~
关键词 无证书公钥密码体制 代理盲签名 前向安全 certificateless public key cryptography proxy blind signature forward security
  • 相关文献

参考文献1

二级参考文献11

  • 1Stinson DR. Crvotoaraohv Theory and Practice. 2nd ed., New York: CRC Press, 2002. 282-285.
  • 2Tan ZW, Liu ZJ. Tang CM. Digital proxy blind signature schemes based on DLP and ECDLP. Vol.21, Beijing: Key Laboratory of Mathematics Mechanization Research, Academy of Mathematics and Systems Science, the Chinese of Academy of Sciences, 2002. 212-217.
  • 3Chaum D. Blind signature systems. In: Chaum D, ed. Proceedings of the Crypto'83. New York: Springer-Vedag, 1998. 153-156.
  • 4Chaum D, Fiat A, Naor M. Untraceable electronic cash. In: Goldwasser S, ed. Proceedings of the Crypto'88. LNCS 403, New York: Springer-Vedag, 1990. 319-327.
  • 5Chaum D, Boen B, Heyst E, Mjolsnes S, Steenbeek A. Efficient off-line electronic check. In: Quisquater J. Vandewalle J, eds. Proceedings of the Eurocrypt'89. LNCS 434, Berlin: Springer-Verlag, 1990. 294-301.
  • 6Brands S. Untraceable off-line cash in wallets with observers. In: Douglas RS, ed. Proceexlings of the Crypto'93. LNCS 773, New York: Springer-Verlag, 1994. 302-318.
  • 7Mambo M, Usuda K,Okamoto E. Proxy signatures for delegating signing operation. In: Proceedings of the 3rd ACM Conference on Computer and communications Security. New Delhi: ACM Press, 1996.48-57.
  • 8Lee B, Kim H, Kim K. Strong proxy signature and its applications. In: Proceedings of the 2001 Symposium on Cryptography and Information Security (SCIS 2001). 2001.
  • 9Zhang K. Threshold proxy signature schemes. In: Okamoto E, Davida G, Mambo M, eds. Proceedings of the Information Security Workshop 1997. LNCS 1396, Berlin: Springer-Verlag, 1998. 191-197.
  • 10Hsu CL, Wu TS, Wu TC. Improvement of threshold proxy signature scheme. Applied Mathematics and Computation, 2003,136:315-321.

共引文献90

同被引文献45

  • 1李景峰,潘恒,祝跃飞.基于单向散列链的公钥证书撤销机制[J].小型微型计算机系统,2006,27(4):642-645. 被引量:9
  • 2张学军,王育民.高效的基于身份的代理盲签名[J].计算机应用,2006,26(11):2586-2588. 被引量:16
  • 3LI Yanping,SI Guangdong,WANG Yumin.A New Forward-Secure Authenticated Encryption Scheme with Message Linkages[J].Wuhan University Journal of Natural Sciences,2006,11(6):1537-1540. 被引量:1
  • 4Chaum D.Blind signatures for untraceable payment [C] //Advances inCryptology-Crypto1 82.New York:Plenum Press,1983:199-203.
  • 5Lin W D,Jan J K.A security personal learning tools using a proxy blindsignature scheme [C] //Proc of International Conference on ChineseLanguage Computing.USA:Chinese Language Computer SocietyKnowledge Systems Institute,2000:273-277.
  • 6Anderson R.Two remark on public key cryptology [C] //Proceedings ofthe 4th ACM Computer and Communication Security.Zurich,Switzer-land,1997:1-7.
  • 7Chaum D.Blind signatures for untraceable payments[C]//Proceedings of Advances in Cryptology-Crypto'82.New York: Plenum Press, 1983 : 199-203.
  • 8Mambo M, Usuda K, Okamoto E.Proxy signatures for dele-gating signing operation[C]//Advances in the 3rd ACM Conference on Computer and Communications Security.New York: ACM Press, 1996 : 48-57.
  • 9Mambo M, Usuda K, Okamoto E.Proxy signatures: delega- tion of the power to sign messages[J].IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 1996,79(9) : 1338-1354.
  • 10Anderson R.Two remarks on public key cryptology[C]//The Fourth ACM Computer and Communication Security.New York: ACM Press, 1997 : 151-160.

引证文献5

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部