期刊文献+

新的基于证书的代理盲签名方案 被引量:5

Certificate-based proxy blind signature scheme
下载PDF
导出
摘要 针对已有公钥密码系统下代理盲签名的安全性问题及签名方案效率不高的问题,结合Li等人基于证书代理签名的概念,给出了基于证书代理盲签名的定义,并提出一个新的基于证书代理盲签名方案。给出方案的性能分析,分析结果表明新方案不仅能满足代理盲签名的所有安全性质,且签名算法效率也有所提高,更适合实际应用。 For the security problem and the low efficiency of signature schemes under existing public key cryptography system, combining with the concept of certificate-based proxy signature presented by Li et al., gives a definition of certifi-cate-based proxy blind signature, and a new certificate-based proxy signature is proposed. Finally, an analysis of perfor-mance for the scheme is presented, the results show that the scheme can not only meet all required security properties of a proxy blind signature scheme, but the efficiency of signature algorithm is also improved, which is more suitable for practical applications.
出处 《计算机工程与应用》 CSCD 2014年第4期57-62,共6页 Computer Engineering and Applications
基金 青岛市科技发展计划项目(No.11-2-4-6-(1)-jch) 山东科技大学研究生创新基金(No.YCA120340)
关键词 基于证书 代理盲签名 随机预言模型 certificate-based proxy blind signature random oracle model
  • 相关文献

参考文献5

二级参考文献26

  • 1王蜀洪,王贵林,鲍丰,王杰.对一个基于离散对数代理盲签名的密码分析(英文)[J].软件学报,2005,16(5):911-915. 被引量:22
  • 2张学军,王育民.高效的基于身份的代理盲签名[J].计算机应用,2006,26(11):2586-2588. 被引量:16
  • 3Shamir A.Identity-based cryptosystems and signature schemes[C]// LNCS 196 Crypto 1984,Berlin, 1984:47-53.
  • 4Gentry C.Certificate-based encryption and the certificate revocation problem[C]//LNCS 2656:Advances in Cryptology-EUROCRYPT 2003. [S.l.] : Springer-Verlag, 2003 : 272-293.
  • 5AI-Riyami S S,Paterson K G.Certificateless public key cryptography[C]//LNCS 2894:Advances in Cryptology-ASIACRYPT 2003. Berlin : Springer-Verlag, 2003 : 452-473.
  • 6Girault M.Self-certified public keys[C]//LNCS 434:Advances in Cryp-tology : Proc Eurocrypt 1991.[S.l.] : Springer, 1991 : 490-497.
  • 7Chen X,Zhang F,Kim K.A new ID-based group signature scheme from bilinear pairings[EB/OL].[2006].http://eprint.iacr.org/2003/116.pdf.
  • 8Lin W D,Jan J K.A security personal learning tools using a proxy blind signature scheme[C]//Proceedings of International Conference On Chinese Language Computing, Illinois, USA, 2000: 273-277.
  • 9Awasth I AK,Lal S.Proxy blind signature scheme[J].JFCR Transaction on Cryptology, 2005,2 ( 1 ) : 5-11.
  • 10Sun H M,Hsieh B T.On the security of some proxy blind signature schemes[J/OL].[2003].http ://eprint.iacr.org/2003/6S.

共引文献30

同被引文献58

  • 1Shamir A. Identity-based cryptosystems and signature schemes[C] /// Proceeding o{ Crypto' 84. LNCS 196, Berlin: Springer- Verlag, 1984 47-53.
  • 2AI-Riyami S S, Paterson K G. Certificateless public key cryptog- raphy[C]//Proceeding of ASIACRYPT 2003. LNCS 2894, Ber- lin: Springer-Verlag, 2003 : 452-473.
  • 3Gentry C. Certificate-based encryption and the certificate revo- cation problem[C]//Proc, of EuroCrypt. Berlin= Springer-Ver [ag, 2003 272-293.
  • 4Mambo M, Usuda K, Okamoto E. Proxy signature:delegation of the power to sign messages[J]. IEICE Trans. Fundamentals, 1996,E79 A(9) : 1338-1353.
  • 5Hwang S J, Chen C C. A New Multi-Proxy Multi-Signature Scheme[C]//200I National Computer Symposium: Information Security. Taiwan, 2001 : 19-26.
  • 6Kang B G, Park J H, Hahn S G. A certificate-based signature scheme[C]//Proc, of CT-RSA. Berlin: Springer-Verlag, 2004 : 99-111.
  • 7Boldyreva A, Palacio A, Warinschi B. Secure proxy signature schemes for delegation of signing rights[J]. Journal of cryptolo- gy,2012,25(1) 57-115.
  • 8Wang Qin,Cao Zhen-fu. Security arguments for partial delega tion with warrant proxy signature schemes[EB/OL]. [2004-11- 17]. http://erpint, iacr. org/2004/315, pdf.
  • 9Li Ji-guo, Huang Xin-yi, Mu Yi, et al. Certificate-based signa- ture: security model and efficient construction[C]//Proe, of Eu- roPKU2007. 2007 : 110-125.
  • 10Wu Wei, Mu Yi, Susilo W, et al. Certificate-based signatures re- visited[J]. Journal of universal computer science, 2009,15 (8) 1659-1684.

引证文献5

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部