期刊文献+

代理盲签名和多重代理盲签名的安全性分析

Security Analysis of Proxy Blind Signature and Multi-proxy Blind Signature
下载PDF
导出
摘要 王国瞻等人(计算机工程,2010年第3期和第8期)分别对谷利泽等人提出的代理盲签名方案和Lu等人提出的多重代理盲签名方案进行攻击,指出这2个方案不满足盲性。针对王国瞻等人对谷利泽等人和Lu等人方案的可追踪性攻击问题,指出王国瞻等人的攻击是无效的,并采用构造方法证明代理签名人不能根据已有的信息追踪到签名。分析结果证明,王国瞻等人的攻击无效,谷利泽等人的方案和Lu等人的方案仍然满足盲性,是不可追踪的。 Wang Guozhan et al.(Computer Engineering,2010,No.3 and No.8) attacks a proxy blind signature scheme proposed by Gu Lize et al.and a multi-proxy blind signature scheme proposed by Lu et al.respectively,and points out that the two schemes do not satisfy the property of blindness.Aiming at Wang et al.’s attack to the scheme of Gu Lize et al and the scheme of Lu et al.,this paper points out that Wang Guozhan et al.’s attack is not valid,and uses the method of construction to prove that the proxy signer can not use gained information to track signature.Analysis result shows that both of Gu Lize et al.’s scheme and Lu et al.’s scheme still satisfy the property of blindness and they are unlinkable.
出处 《计算机工程》 CAS CSCD 2013年第2期160-163,共4页 Computer Engineering
基金 国家自然科学基金资助项目(61103213) 上海市教育委员会科研创新基金资助项目(10YZ201) 上海高校选拔培养优秀青年教师科研专项基金资助项目(RYQ309002)
关键词 代理盲签名 多重代理盲签名 盲签名 盲性 不可伪造性 不可追踪性 proxy blind signature multi-proxy blind signature blind signature blindness unforgeability unlinkability
  • 相关文献

参考文献11

  • 1Chaum D. Blind Signatures for Untraceable Payments[A].Plenum,USA:[s.n.],1983.199-203.
  • 2Mambo M,Usuda K,Okamoto E. Proxy Signature Delegation of the Power to Sign Messages[J].IEICE Trans on Fundations,1996,(09):1338-1353.
  • 3谷利泽,张胜,杨义先.代理盲签名方案及其在电子货币中的应用[J].计算机工程,2005,31(16):11-13. 被引量:19
  • 4Zhang Ni,Xi Xuefeng,Ren Jianping. ID-based Proxy Blind Signature Scheme with Unlinkability[A].[S.1.]:IEEE Computer Society,2011.4234-4237.
  • 5Daniyal M A,Mohamedl S T,Hamid H S. A Secure Proxy Blind Signa-ture Scheme Using ECC[A].[S.1.]:Springer,2011.47-52.
  • 6Fan Kai,Wang Yue,Li Hui. A New Proxy Blind Signature Scheme[J].International Journal of Grid and Utility Computing,2012,(01):38-42.
  • 7He Junjie,Qi Chuanda,Sun Fang. A New Identity-based Proxyblind Signature Scheme[A].[S.1.]:IEEE Computer Society,2012.345-348.
  • 8Daniyal M A,Mohamedl S T,Hamid H S. A New Proxy Blind Signature Scheme Based on ECDLP[J].International Journal of Computer Science,2011,(33):73-79.
  • 9Lu Rongxing,Cao Zhenfu,Zou Yuan. Proxy Blind Multi-signature Scheme Without a Secure Channel[J].Applied Mathematics and Computation,2005,(01):179-187.
  • 10王国瞻,亢保元,成林.一个代理盲签名方案的分析[J].计算机工程,2010,36(3):134-135. 被引量:4

二级参考文献20

  • 1谷利泽,张胜,杨义先.代理盲签名方案及其在电子货币中的应用[J].计算机工程,2005,31(16):11-13. 被引量:19
  • 2Chaum D. Blind Signature for Untraceable Payments[C]//Proc. of Crypto'82. New York, USA: Plenum Press, 1983: 199-203.
  • 3Mambo M, Usuda K, Okamoto K. Proxy Signature: Delegation of the Prower to Sign Message[J]. IEICE Trans. on Fundam, 1996, 79(9): 1338-1353.
  • 4Wu Linchuan, Yeh Yi-Shiung, Liu Tsann-Shyong. Analysis of Sun et al's Linkability Attack on Some Proxy Blind Signature Shemes[J]. System Software, 2006, 79(2): 176-179.
  • 5Sun Hungmin, Hsieh B T, Tseng S M. On the Security of Some Proxy Blind Signature Scheme[J]. Journal of System and Software, 2005, 74(3): 297-302.
  • 6Tan Zuowen, Liu Zhuojun, Tang Chunming. Digital Proxy Blind Signature Schemes Based on DLP and ECDLP[J]. MM Resarch Pre-prints, 2002, (21): 212-217.
  • 7Chaum D.Blind Signature for Untraceable Payments[C]//Proc.of Crypto'82.New York,USA:Plenum Press,1983:199-203.
  • 8Mambo M,Usuda K,Okamoto K.Proxy Signature:Delegation of the Power to Sign Message[J].IEICE Trans.on Fundamental,1996,E79-A(9):1338-1353.
  • 9Lu Rongxing,Cao Zhenfu,Zhou Yuan.Proxy Blind Multi-signature Scheme Without a Secure Channel[J].Applied Mathematics and Cumputation,2005,164(1):179-187.
  • 10Wu Lin-Chuan,Yeh Yi-Shiung,Liu Tsann-Shyong.Analysis of Sun et al.'s Linkability Attack on Some Proxy Blind Signature Shemes[J].System Software,2006,79(2):176-179.

共引文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部