期刊文献+

基于FPGA的DDS型数字信号发生器设计

Analysis and improvement of proxy blind signature scheme
下载PDF
导出
摘要 数字信号发生器是集成电路设计及调试过程中经常用到的工具,基于FPGA设计了一种DDS型数字信号发生器,可产生正弦波、方波、三角波和锯齿波这四种信号,并具有频率可调功能。 Through the security analysis of the proxy blind signature scheme which is proposed by Liu et al., it shows that security flaws exist in the scheme: a dishonest original signer can forge the proxy signing key, that is to say it doesn' t satisfy strong unforgeability; the proxy signer can make a linkage between the signature on original message and the signature on corresponding blind message, that is to say the scheme is linkable. An improved scheme is pro- posed to overcome these security problems. By modifying the equation of the delegate authorization and the process of blind signature, the new scheme can resist the original signer's forgery attacks, and also has tmlinkability.
出处 《计算机工程与应用》 CSCD 2012年第24期81-84,共4页 Computer Engineering and Applications
基金 河南省自然科学基金(No.102102210242)
关键词 FPGA DDS 数字信号发生器 proxy blind signature discrete logarithm unlinkability forgery attack
  • 相关文献

参考文献11

  • 1Chaum D.Blind signatures for untraceable payments[C]// Advances in Cryptology-CRYPTO' 82.New York: Plenum Press, 1983: 199-203.
  • 2Lysyanskaya A,Ramzan Z.Group blind digital signatures: a scalable solution to electronic cash[C]//LNCS 1465:Fi- nancial Cryptography(FC' 98 ), 1998: 184-197.
  • 3Abe M, Fujisaki E.How to date blind signatures[C]//LNCS 1163: Advances in Cryptology-ASIACRYPT' 96, 1996: 224-251.
  • 4Abe M,Okamoto T.Provably secure partially blind signa- tures[C]//LNCS 1163 : Advances in Cryptology-CRYPTO' 00, 2000: 271-299.
  • 5Zhang Fangguo, Kim Kwangjo.Id-based blind signature and ring signature from pairings[C]//LNCS 2501:Advances in Cryptology-ASIACRYPT' 02,2002: 533-547.
  • 6Mambo M, Usuda K, Okamoto E.Proxy signature: delegation of the power to sign messages[J].IEICE Transac- tions on Fundamentals, 1996,E79-A(9) : 1338-1354.
  • 7Lin W D, Jan J K.A security personal learning tools us- ing a proxy blind signature scheme[C]//Proceedings of International Conference on Chinese Language Comput- ing, Illinois, USA, 2000 : 273-277.
  • 8Tan Zuowen, Liu Zhuojun, Tang Chunming.Digital proxy blind signature schemes based on DLP and ECDLP[J]. MM Research Preprints, 2002,21 (7) : 212-217.
  • 9Sun H, Hsieh B.On the security of some proxy signature schemes[C/OL]//AISW2004, Dunedin, New Zealand, 2004. http ://eprint.iacr.org/2003/068.
  • 10傅晓彤,卢明欣,肖国镇.对一类基于离散对数的代理盲签名体制的伪造攻击[J].西安电子科技大学学报,2005,32(5):777-780. 被引量:4

二级参考文献10

  • 1XU Zhong DAI Guanzhong YANG Deming.An Efficient ECDSA-Based Signature Scheme for Wireless Networks[J].Wuhan University Journal of Natural Sciences,2006,11(6):1707-1710. 被引量:4
  • 2Mambo M,Usuda K,Okamoto E.Proxy signatures for delegating signing operation[C]//Proc of 3rd ACM Conference on Computer and Communications Security.New York:ACM Press, 1996:48-57.
  • 3Chaum D.Blind signatures for untraceable payments[C]//Proceedings of Eurocrypt' 82.Burg Feuerstein, Germany: Plenum Press, 1983 : 199-203.
  • 4Lin W D, Jan J K.A security personal learning tools using a proxy blind signature scheme[C]//Proceedings of International Conference on Chinese Language Computing.Washington:IEEE Computer Society, 2000: 273-277.
  • 5Tan Zhuo-wen, Liu Zuo-jun, Tang Chun-ming.Digital proxy blind signature schemes based on DLP and ECDLP[J].MM Research Preprints,2002,21(7) :212-217.
  • 6Zhang F G, Safavi-Naini R, Lin C Y.New proxy signature, proxy blind signature and proxy ring signature schemes from bilinear pairings[EB/OL]. (2003-5-29) .http ://eprint.iacr.org/2003/104.
  • 7Li Ji-guo, Wang Shu-hong.New efficient proxy blind signature scheme using verifiable self-certified public key[J].International Journal of Network Security,2007,4(2):193-200.
  • 8秦宝东.对两种基于离散对数代理盲签名的分析[J].计算机工程与应用,2009,45(3):104-105. 被引量:2
  • 9傅晓彤,伊丽江,肖国镇.一类新的代理多重签名体制[J].西安电子科技大学学报,2001,28(6):729-731. 被引量:19
  • 10谭作文,刘卓军,唐春明.基于离散对数的代理盲签名(英文)[J].软件学报,2003,14(11):1931-1935. 被引量:91

共引文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部