期刊文献+

一个前向安全盲签名方案的分析与改进 被引量:1

Cryptanalysis and Improvement of a Forward-Secure Blind Signature Scheme
下载PDF
导出
摘要 对何俊杰等人提出的基于二次剩余的前向安全盲签名方案进行安全性分析,指出方案不满足前向安全性,并提出了一种改进方案.分析结果表明,在二次剩余的平方根计算和2l次根计算困难的假设下,改进方案具有前向安全性;其不可伪造性则依赖于离散对数难题和二次剩余的2l次根计算难题. Cryptanalysis of the forward-secure blind signature scheme proposed by He Junjie et al. showed that the scheme does not satisfy forward security. An improved forward-secure blind signature scheme was proposed. Analysis results showed that the improved scheme has forward security under the assumption which make solving the square root and 2t -th root of a quadratic residue hard, and its unforgeability dependends on the hardness of discrete logarithm problems and the problems of computing 2t -th root of a quadratic residue.
出处 《信阳师范学院学报(自然科学版)》 CAS 北大核心 2014年第3期444-446,共3页 Journal of Xinyang Normal University(Natural Science Edition)
基金 国家自然科学基金项目(61272465) 河南省自然科学基金项目(122400550189 142300410320 142400410486)
关键词 盲签名 前向安全性 二次剩余 离散对数 blind signature forward security quadratic residue discrete logarithm
  • 相关文献

参考文献10

  • 1Chaum D. Blind signatures for untraceable payments[ C]// Proc of CRYPTO' 82. New York, USA : Plenum Press, 1983 : 199-203.
  • 2Anderson R. Two remarks on public-key cryptology[ C ]//Proe of the 4th ACM Computer and Communications Se( urity. New York, USA : ACM Press, 1997: 151-160.
  • 3Due D N, Cheon J H, Kim K. A forward-secure blind signature scheme based on the strong RSA assumption[ C ]//Proc of the 5th International Conference on Information and Communications Security. New York, USA: Springer-Verlag. 2003:11-21.
  • 4Lai Y P, Chang C C. A simple forward secure blind signature scheme based on master keys and blind signatures[ C ]// Prm: of the 19th Interna- tional Conference on Advanced Information Networking and Applications. Washington D C, USA: IEEE Press, 2005: 139-144.
  • 5Chow S S M, Hui L C K, Yiu S M, et al. Forward-secure multisignature and blind signature schemes [ J]. Applied Mathematics aml Computa- tion, 2005, 168(2) : 895-908.
  • 6Huang H F, Chang C C.'A new forward-secure blind signature scheme[ J]. Journal of Engineering and Applied Scienc, es, 2007, 2 ( 1 ) : 230- 235.
  • 7刘亚丽,殷新春,孟纯煜.一种基于ElGamal体制的前向安全强盲签名方案[J].微电子学与计算机,2007,24(10):95-98. 被引量:4
  • 8张席,杭欢花.一种改进的前向安全盲签名方案[J].武汉大学学报(理学版),2011,57(5):434-438. 被引量:7
  • 9何俊杰,王娟,祁传达.一个改进的前向安全盲签名方案[J].计算机工程,2012,38(11):133-135. 被引量:5
  • 10柴震川,董晓蕾,曹珍富.利用二次剩余构造的基于身份的数字签名方案[J].中国科学(F辑:信息科学),2009,39(2):199-204. 被引量:9

二级参考文献39

  • 1Okamoto T. Provable secure and practical identifyca- tion schemes and corresponding digital signature schemes[C]//Crypto' 92. New York: Springer Ver- lag, 1992 : 3-52.
  • 2Chaum D. Blind signatures for untraceable payments [C]//Crypto' 82. New York: Plenum Press, 1982: 199-203.
  • 3Anderson R. Two remarks on public-key cryptology [C]//The Fourth Annual Conference on Computer and Communications Security, Zurich: IEEE Press, 1997.
  • 4Duc D N,Cheon J H,Kim K. A forward-secure blind signature scheme based on the strong RSA assumption [ C]//Information and Communications Security, Proceedings of the Fifth International Conference, LNCS 2836, New York: Springer-Verlag,2003.
  • 5Wang Shuhong, Bao Feng, Deng R H. Cryptanalysis of a forward secure blind signature scheme with prov- able security[C]//ICICS 2005, LNCS 3783. Berlin Heidelberg: Springer-Verlag, 2005 : 53-60.
  • 6Lai Yeupong, Chang Chinchen. A simple forward se- cure blind signature scheme based on master keys and blind signatures[ C]/ / Proceedings of the 19th Interna- tional Conference on AINA ' 05. New York: IEEE, 2005:139-144.
  • 7Chow S S M, Hui L C K, Yiu S M,et al. Forward-se- cure multisignature and blind signature schemes[J]. Applied Mathematics and Computation, 2005, 168: 895-908.
  • 8Huang Huifeng, Chang Chinchen. A new forward-se- cure blind signature scheme[J]. Journal of Engineer- ing and Applied Sciences, 2007,2(1) : 230-235.
  • 9Liu Yali, Yin Xinehun, Chen Juewei. A forward se- cure blind signature scheme[C]//2008 Congress on Image and Signal Processing. New York: IEEE, 2008:7-11.
  • 10Christoph G G.An identity-based key-exchange protocol[C].Lecture Notes in Computer Science.Advances in Cryptology EUROCRYFT89,Houthalen,Betgium.New York:Springer-Veflag.1990:29-37

共引文献18

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部