期刊文献+

对两个代理盲多重签名的分析和改进

Analysis and Improvement of Two Proxy Blind Multi-signature Schemes
下载PDF
导出
摘要 盲签名和代理多重签名在电子商务和电子现金系统中有着广泛的应用。结合这两种签名的特点,人们提出了代理盲多重签名方案。在代理盲多重签名中,一个原始签名组将签名权委托给代理签名人,由其对签名请求者发送来的盲化消息进行代理签名。通过分别对秦艳琳等人和周立章提出的代理盲多重签名方案的安全性分析,发现秦的方案中一个恶意的原始签名人可以伪造出代理签名密钥,从而生成代理盲多重签名;并同时指出周的方案无法抵挡代理签名伪造攻击,不满足不可伪造性。针对上述两种攻击,在秦方案的基础上提出了一种新的方案,证明及分析了新方案的正确性和安全性。该方案有效地克服了原方案的缺陷,并满足代理盲多重签名的各种要求,提高了系统的安全性。 Blind signature and proxy multi-signature are widely used in e-commerce and e-cash systems.Combining with the feature of two signatures,people propose the proxy blind multi-signature scheme.In proxy blind multi-signature,an original signer group delegates the signing power to a proxy signer,which can sign the blinded message sent by the signing requestor.Security analyses of two proxy blind multi-signature schemes proposed respectively by Qin et al.and Zhou are presented here.Qin et al.'s scheme can't resist the proxy signing key forgery attack from a malicious original signer who uses the forged proxy signing key to generate the proxy blind multi-signature.Zhou proposed another proxy blind multi-signature scheme also based on Elliptic Curve Cryptography.However,we find that a proxy signer can forge a proxy blind multi-signature without the delegation of original signer group.According to the above forgery attacks,a novel proxy blind multi-signature scheme based on Qin et al.'s scheme is proposed,and it proved to be much more correct and safer than the former scheme.
作者 王璐 亢保元
出处 《计算机与数字工程》 2012年第10期102-104,165,共4页 Computer & Digital Engineering
关键词 椭圆曲线密码学 多重代理签名 盲签名 不可伪造性 elliptic curve cryptography multi-signature proxy signature blind signature
  • 相关文献

参考文献13

  • 1D. Chaurru Blind Signature for Untraceable Payments[C]. Advances in Cryptology Crypto, 1982 199-203.
  • 2Fan Chun-I, Lei Chin-Laung. Low-computation partially blind signatures or electronic cash[J]. IEICE Transactions on Fun- damentals of Electronics, Communications and Computer Sci- ences, May 1998 E81 A (n5):818-824.
  • 3GalIegos-Garcia Gina, G6mez-Cdrdenas Roberto, DuchfiN- Sdnchez Gonzalo I. Identity based threshold cryptography and blind signatures for electronic voting[J]. WSEAS Transactions on Computers, January, 2010, 9(nl) : 62-71.
  • 4Mambo M. , Usuda K. Okamoto E. Proxy Signature for Delegating Signing Operation[C]. In Proceedings of the 3. th ACM Conference on Computer and Communications Security, New York: ACM Press, 48-57.
  • 5Yi Lijiang, Bai Guoqiang, Xiao Guozhen. Proxy multi-signa- ture seheme:a new type of proxy signature scheme[J]. Elec- tronics Letters,2000,36(6) 527-528.
  • 6Chien, Hung-Yu. Extending RSA cryptosystems to proxy multi-signature scheme allowing parallel individual signing op- eration[J]. Journal of the Chinese Institute of Engineers, Transactions of the Chinese Institute of Engineers, Series A/ Chung-kuo Kung Ch' eng Hsuch K/ an, May, 2006, 29 (n3) : 527-532.
  • 7Feng Cao, Zhenfu Cao. A secure identity-based multi-proxy signature scheme [J]. Computes Electrical Engineering, 2009,35(1) :86-95.
  • 8Rongxing Lu, Zhenfu Cao, Yuan Zhou. Proxy blind multi-sig nature scheme without a secure channel[J]. Applied Mathe- matics and Computation, May 2005,164(1):179-187.
  • 9胡振鹏,钱海峰,李志斌.一种高效的代理多重盲签名方案[J].计算机工程,2008,34(13):130-132. 被引量:7
  • 10康莉,蔡勉,王亚军.基于Nyberg-Rueppel签名体制的盲代理多重签名方案[J].通信学报,2007,28(3):115-119. 被引量:12

二级参考文献23

共引文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部