期刊文献+

一种高效的门限部分盲签名方案 被引量:2

Efficient Threshold Partially Blind Signature Scheme
下载PDF
导出
摘要 现有的门限签名方案使用一些低效的MapToPoint哈希函数,难以避免因多次使用哈希函数而带来的安全性危害。为此,将门限签名和部分盲签名相结合,提出一种新的基于双线性对的门限部分盲签名方案。分析结果表明,该方案使用高效的普通哈希函数,可提高执行效率,具有满足门限签名和部分盲签名的优点。 In view of some inefficient MapToPoint hash functions are used in existing threshold signature schemes.which cause these schemes to be very difficult to avoid the threats because of the hash functions many times use in the cryptography.A new threshold partially blind signature from bilinear pairings is proposed which combines the threshold signature and partially blind signature together.Analysis result shows that the new scheme only needs efficient common hash functions,it can improve the efficiency of the scheme and meet the merits of threshold and partially blind signature.
出处 《计算机工程》 CAS CSCD 2012年第1期130-131,134,共3页 Computer Engineering
基金 国家自然科学基金资助项目(10571113) 陕西省自然科学基金资助项目(2009JM8002) 陕西省教育厅科学研究计划基金资助项目(2010JK829) 中央高校基本科研业务费专项基金资助项目(GK201002041)
关键词 门限签名 部分盲签名 强壮性 单向哈希函数 双线性对 threshold signature partially blind signature robustness one-way hash function bilinear pairings
  • 相关文献

参考文献3

二级参考文献16

  • 1Zhang Fangguo, Kim K. ID-based Blind Signature and Ring Signature from Pairings[C]//Proc. of ASIACRYPT'02. Berlin, Germany: Springer-Verlag, 2002: 533-547.
  • 2Zhang Fangguo, Kim K. Efficient ID-based Blind Signature and Proxy Signature from Bilinear Pairings[C]//Proc. of Australasian Conference on Information Security and Privacy. Berlin, Germany: Springer-Verlag, 2003: 312-323.
  • 3Chen Xiaofeng, Zhang Fangguo. /D-based Restrictive Partially Blind Signatures[C]//Proc. of Conference on Computational Intelligence and Security. Berlin, Germany: Springer-Verlag, 2005: 117-124.
  • 4Chen Xiaofeng, Zhang Fangguo. New ID-based Threshold Signature Scheme from Weil Pairing[C]//Proc. of INDOCRYPT'04. Berlin, Germany: Springer-Verlag, 2004:371-383.
  • 5JUANG WS, LEI CL. A Secure and Practical Electronic Voting Scheme for Real World Environments[J]. IEICE Transactions on Fundamentals, 1997, E80-A(1): 64 -71.
  • 6JUANG WS, LEI CL. Blind threshold signature based on discrete logarithm[A]. Proceedings of the 2nd Asian Computing Science Conference, Lecture Notes in Computer Science[C], Springer-Ver-lag, 1996.1179.172 -181.
  • 7ZHANG F, KIM K. Efficient ID-Based blind signature and proxy signature from bilinear parings[A]. Proc of ACISP'03[C]. Wollongong, Australia, LNCS 2727, Berlin: Springer-Verlag, 2003. 312- 323.
  • 8Shamir A. How to Share a Secret[J]. Communication of ACM,1979, 22(11): 612 - 613.
  • 9王育民 肖国镇.密码学与数据安全[M].北京:国防工业出版社,1991.211-215.
  • 10BARRETO P, KIM H, LYNN B, et al. Efficient Algorithems for Pairing-Based Cryptosystems[A]. CRYPTO 2002[C]. Springer-Ver-lag, 2002, LNCS 2442.354 - 368.

共引文献16

同被引文献19

  • 1李鸿.一种基于椭圆曲线的部分盲签名方案[J].宿州师专学报,2004,19(1):89-91. 被引量:2
  • 2陆洪文,郑卓.基于双线性对的门限部分盲签名方案[J].计算机应用,2005,25(9):2057-2059. 被引量:8
  • 3余昭平,康斌.基于椭圆曲线的新型可验证门限盲签名方案[J].计算机工程,2007,33(23):161-162. 被引量:4
  • 4CHAUM D. Blind Signature r Untraceable Payments[C]//Proceeding of Advancein Crytology-EUROCtypto'82, Plenum Press, 1983:199-203.
  • 5ABE M, FUJISAKI E. How to Date Blind Signature[C]//Proceedings of Advances in Cryptology-Asiacpt'96, LNCS,Spfinger, 1996:244-251.
  • 6DESMEDT Y, FRANKEL Y. Threshold cryptosystems[C]//Advances in Cryptology-Crypto 89, Lectures Notes in Computer Sci-ence 435, Berlin:Springel"-V erlag, 1989:307 -315.
  • 7DESMEDT Y. Threshold cryptosystems[J].European Trans on Telecommunications, 1994,5(4):449-457.
  • 8GENNARO R,JARECKI S,KRAWCZYK H, et al. Robust threshold DSS signatures[C]//Lectures Notes in Computer Science, Ber- lin:Springer-Verlag,1996:354-371.
  • 9GENNARO R,JARECKI S,KRAWCZYK H, et al. Secure distributed key generation for discrete-log based cryptosystems[C]// Lectures Notes in Computer Science, Berlin:Springer-Verlag, 1999:295-310.
  • 10POINTCHEVAL D, STERN J. Security arguments for digital signatures and blind signatures[J].Journal of Cryptology,2000,13(3): 316-396.

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部