期刊文献+

一种基于无证书的门限盲代理盲签名方案

A Certificateless-based Threshold Blind Proxy Blind Signature Scheme
下载PDF
导出
摘要 在无证书的公钥密码体制下,提出了一个基于无证书的门限盲代理盲签名方案。将代理签名、盲签名还有门限签名有机的结合,既解决了代理者权利过大的问题,又保护了代理者的隐私。该方案满足正确性、强不可否认性、不可伪造性、盲性等性质。 A certificateless-based threshold blind proxy blind signature scheme was presented by using certificateless public key cryptography. The combination of proxy signature and blind signature and threshold signature was used in this paper, which can solve the problem of the proxy signer' s au- thority was too big, and protect the proxy signer' s privacy, the scheme satisfies accuracy, strong nonre- pudiation, unforgeability, blind, et al.
作者 陈楠 张建中
出处 《咸阳师范学院学报》 2013年第6期4-6,共3页 Journal of Xianyang Normal University
基金 国家自然科学基金项目(61173190 61273311) 陕西省自然科学基础研究计划项目(2010JQ8027) 陕西省教育厅科研基金项目(2010JK398 12JK1003) 中央高校基本科研业务费项目(GK201002041)
关键词 双线性对 无证书公钥密码体制 门限签名 盲代理盲签名 bilinear pairing certificateless public key cryptography threshold blind proxy blindsignature
  • 相关文献

参考文献4

二级参考文献21

  • 1吴问娣,曾吉文.一种无证书的环签名方案和一个基于身份的多重签名方案[J].数学研究,2006,39(2):155-163. 被引量:15
  • 2Al-Riyami S S,Paterson K G.Certificateless Public Key Cryptography[C]//Proc.of Cryptology-ASIANCRYPT'03.Berlin,Germany:Springer-Verlag,2003:452-473.
  • 3Gorantla M C,Saxena A.An Efficient Certificateless Signature Scheme[C]//Proc.of the CIS'05.Berlin,Germany:Springer-Verlag,2005:110-116.
  • 4Chen Xiaofeng,Zhang Fangguo,Kim K.A New ID-based Group Signature Scheme from Bilinear Pairings[C]//Proc.of WISA'03.Berlin,Germany:Springer-Verlag,2003:585-592.
  • 5Mambo M,Usuda K,Okamoto E.Proxy signature:delegation of the power to sign messages[J].IEICE Transactions on Fundamen-tals,1996,E79-A(9):1338-1354.
  • 6Zhang K.Threshold proxy signature schemes[C]//LNCS1396:In-formation Security Workshop,Japan,1997.Berlin:Springer-Verlag,1997:191-197.
  • 7Bao H Y,Cao Z F,Wang S B.Identity-based threshold proxy sig-nature scheme with known signers[C]//LNCS3959:The3rd An-nual Conference in Theory and Applications of Models of Com-putation,Beijing,China,2006.Berlin:Springer-Verlag,2006:538-546.
  • 8Huang H F,Chang C C.A novel efficient(tn)threshold proxy signature scheme[J].Information Sciences,2006,176(10):1338-1349.
  • 9Al-Riyami S,Paterson K.Certificateless public key cryptography[C]//LNCS2894:Proceedings of the Asiacrypt,Taipei,China,2003.Berlin:Springer-Verlag,2003:452-473.
  • 10Harn L,Ren J,Lin C L.Design of DL-based certificateless digi-tal signatures[J].The Journal of Systems and Software,2009,82(5):789-793.

共引文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部