期刊文献+
共找到42篇文章
< 1 2 3 >
每页显示 20 50 100
Quantum circuit-based proxy blind signatures:A novel approach and experimental evaluation on the IBM quantum cloud platform
1
作者 娄小平 昝慧茹 徐雪娇 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第5期247-253,共7页
This paper presents a novel approach to proxy blind signatures in the realm of quantum circuits,aiming to enhance security while safeguarding sensitive information.The main objective of this research is to introduce a... This paper presents a novel approach to proxy blind signatures in the realm of quantum circuits,aiming to enhance security while safeguarding sensitive information.The main objective of this research is to introduce a quantum proxy blind signature(QPBS)protocol that utilizes quantum logical gates and quantum measurement techniques.The QPBS protocol is constructed by the initial phase,proximal blinding message phase,remote authorization and signature phase,remote validation,and de-blinding phase.This innovative design ensures a secure mechanism for signing documents without revealing the content to the proxy signer,providing practical security authentication in a quantum environment under the assumption that the CNOT gates are securely implemented.Unlike existing approaches,our proposed QPBS protocol eliminates the need for quantum entanglement preparation,thus simplifying the implementation process.To assess the effectiveness and robustness of the QPBS protocol,we conduct comprehensive simulation studies in both ideal and noisy quantum environments on the IBM quantum cloud platform.The results demonstrate the superior performance of the QPBS algorithm,highlighting its resilience against repudiation and forgeability,which are key security concerns in the realm of proxy blind signatures.Furthermore,we have established authentic security thresholds(82.102%)in the presence of real noise,thereby emphasizing the practicality of our proposed solution. 展开更多
关键词 proxy blind signature quantum circuits quantum computation IBM quantum cloud platform
下载PDF
Fair quantum blind signatures 被引量:3
2
作者 王天银 温巧燕 《Chinese Physics B》 SCIE EI CAS CSCD 2010年第6期66-70,共5页
We present a new fair blind signature scheme based on the fundamental properties of quantum mechanics. In addition, we analyse the security of this scheme, and show that it is not possible to forge valid blind signatu... We present a new fair blind signature scheme based on the fundamental properties of quantum mechanics. In addition, we analyse the security of this scheme, and show that it is not possible to forge valid blind signatures. Moreover, comparisons between this scheme and public key blind signature schemes are also discussed. 展开更多
关键词 fair blind signature single photons hash function
下载PDF
Cryptanalysis of fair quantum blind signatures 被引量:1
3
作者 何立宝 黄刘生 +1 位作者 杨威 许瑞 《Chinese Physics B》 SCIE EI CAS CSCD 2012年第3期63-66,共4页
We investigate the fair quantum blind signature scheme proposed by Wang and Wen [Wang T Y and Wen Q Y 2010 Chin. Phys. B 19 060307], which uses the fundamental properties of quantum mechanics and the availability of a... We investigate the fair quantum blind signature scheme proposed by Wang and Wen [Wang T Y and Wen Q Y 2010 Chin. Phys. B 19 060307], which uses the fundamental properties of quantum mechanics and the availability of a trusted arbitrator. However, in this paper, we find that the protocol cannot satisfy the property of non-forgeability even under the condition that the trusted arbitrator is totally credible. Moreover, a simple feasible suggestion for improving the protocol is proposed. 展开更多
关键词 fair blind signature single photons hash function
下载PDF
Provably Secure Convertible Directed Partially Blind Signatures
4
作者 HUANG Zhenjie CHEN Kefei WANG Yumin 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期55-58,共4页
Combining the concept of partially blind signature with the concept of directed signature, we introduce a new concept of convertible directed partially blind signature (CDPBS), in which only the signer and the user ... Combining the concept of partially blind signature with the concept of directed signature, we introduce a new concept of convertible directed partially blind signature (CDPBS), in which only the signer and the user can verify, confirm and disavow the validity of given signatures and convert given signatures into universally verifiable ones, to meet the need of signing personally or commercially sensitive messages. We give a formal definition of CDPBS and propose a concrete provably secure CDPBS scheme. The proposed scheme is efficient and secure, in which its unforgeability is the same as that of the Schnorr's signature scheme and its untransferability relies on the hardness of the decisional Diffie-Hellman problem. Furthermore, by letting the user's private key be a common constant, the proposed scheme can be used as a normal partially blind signature scheme. 展开更多
关键词 CRYPTOGRAPHY digital signature partially blind signature directed signature CONVERTIBLE
下载PDF
A quantum blind signature scheme based on dense coding for non-entangled states
5
作者 邢柯 殷爱菡 薛勇奇 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第6期220-228,共9页
In some schemes, quantum blind signatures require the use of difficult-to-prepare multiparticle entangled states. By considering the communication overhead, quantum operation complexity, verification efficiency and ot... In some schemes, quantum blind signatures require the use of difficult-to-prepare multiparticle entangled states. By considering the communication overhead, quantum operation complexity, verification efficiency and other relevant factors in practical situations, this article proposes a non-entangled quantum blind signature scheme based on dense encoding. The information owner utilizes dense encoding and hash functions to blind the information while reducing the use of quantum resources. After receiving particles, the signer encrypts the message using a one-way function and performs a Hadamard gate operation on the selected single photon to generate the signature. Then the verifier performs a Hadamard gate inverse operation on the signature and combines it with the encoding rules to restore the message and complete the verification.Compared with some typical quantum blind signature protocols, this protocol has strong blindness in privacy protection,and higher flexibility in scalability and application. The signer can adjust the signature operation according to the actual situation, which greatly simplifies the complexity of the signature. By simultaneously utilizing the secondary distribution and rearrangement of non-entangled quantum states, a non-entangled quantum state representation of three bits of classical information is achieved, reducing the use of a large amount of quantum resources and lowering implementation costs. This improves both signature verification efficiency and communication efficiency while, at the same time, this scheme meets the requirements of unforgeability, non-repudiation, and prevention of information leakage. 展开更多
关键词 quantum blind signature dense coding non-entanglement Hadamard gate
下载PDF
Efficient Privacy Enhanced Software Registration with ID-Based Blind Signatures 被引量:1
6
作者 CHEN Wuping QIN Bo +1 位作者 WU Qianhong ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS 2008年第6期733-738,共6页
In existing software registration schemes, the privacy of users is not taken into account and may be in the risks of abuses. In this paper, we proposed a novel software registration system which can greatly reduce una... In existing software registration schemes, the privacy of users is not taken into account and may be in the risks of abuses. In this paper, we proposed a novel software registration system which can greatly reduce unauthorized use of software while keeping the privacy of users. To the best of our knowledge, this is the first system that the privacy of users is guaranteed in software registration. Our system enjoys a modular design and can be implemented by any secure ID-based partially blind signature scheme. Furthermore, the proposal allows flexible registration information definition. This feature makes our scheme flexible and practical for more software registration applications. 展开更多
关键词 information security privacy enhanced technology software registration ID-based cryptography blind signature
原文传递
CERTIFICATELESS SIGNATURE AND BLIND SIGNATURE 被引量:13
7
作者 Zhang Lei Zhang Futai 《Journal of Electronics(China)》 2008年第5期629-635,共7页
Certificateless public key cryptography is a new paradigm introduced by Al-Riyami and Paterson.It eliminates the need of the certificates in traditional public key cryptosystems and the key escrow problem in IDentity-... Certificateless public key cryptography is a new paradigm introduced by Al-Riyami and Paterson.It eliminates the need of the certificates in traditional public key cryptosystems and the key escrow problem in IDentity-based Public Key Cryptography(ID-PKC).Due to the advantages of the certificateless public key cryptography,a new efficient certificateless pairing-based signature scheme is presented,which has some advantages over previous constructions in computational cost.Based on this new signature scheme,a certificateless blind signature scheme is proposed.The security of our schemes is proven based on the hardness of computational Diffie-Hellman problem. 展开更多
关键词 Certificateless cryptography Digital signature blind signature Certificateless blind signature Computational Diffie-Hellman (CDH) problem
下载PDF
A THRESHOLD BLIND SIGNATURE FROM WEIL PAIRING ON ELLIPTIC CURVES 被引量:6
8
作者 Cheng Xiangguo Xu Weidong Wang Xinmei 《Journal of Electronics(China)》 2006年第1期76-80,共5页
The idea behind a (t, n) threshold blind signature is that a user can ask at least t out of n players of a group to cooperate to generate a signature for a message without revealing its content. This paper first prese... The idea behind a (t, n) threshold blind signature is that a user can ask at least t out of n players of a group to cooperate to generate a signature for a message without revealing its content. This paper first presents a new blind signature scheme from Weil pairing on elliptic curves. Based on this scheme, a threshold blind signature scheme is proposed. It is efficient and has the security properties of robustness and unforgeability. In the proposed scheme, the group manger is introduced to take the role of distributing the group secret key to each player. However, he cannot forge the players to generate partial blind signatures (Each partial blind signature depends on not only the secret key of the player, but also a random number the player picks). Compared with a threshold signature with a trusted third party, its advantage is obvious; Compared with a threshold signature without a trusted third party, it is more simple and efficient. 展开更多
关键词 Signature scheme Threshold blind signature scheme Well pairing Gap Diffie-Hellman group
下载PDF
A New Anti-Quantum Proxy Blind Signature for Blockchain-Enabled Internet of Things 被引量:4
9
作者 Chaoyang Li Gang Xu +2 位作者 Yuling Chen Haseeb Ahmad Jian Li 《Computers, Materials & Continua》 SCIE EI 2019年第8期711-726,共16页
Blockchain technology has become a research hotspot in recent years with the prominent characteristics as public,distributed and decentration.And blockchain-enabled internet of things(BIoT)has a tendency to make a rev... Blockchain technology has become a research hotspot in recent years with the prominent characteristics as public,distributed and decentration.And blockchain-enabled internet of things(BIoT)has a tendency to make a revolutionary change for the internet of things(IoT)which requires distributed trustless consensus.However,the scalability and security issues become particularly important with the dramatically increasing number of IoT devices.Especially,with the development of quantum computing,many extant cryptographic algorithms applied in blockchain or BIoT systems are vulnerable to the quantum attacks.In this paper,an anti-quantum proxy blind signature scheme based on the lattice cryptography has been proposed,which can provide user anonymity and untraceability in the distributed applications of BIoT.Then,the security proof of the proposed scheme can derive that it is secure in random oracle model,and the efficiency analysis can indicate it is efficient than other similar literatures. 展开更多
关键词 Blockchain blockchain-enabled internet of things quantum computers proxy blind signature
下载PDF
A New ID-Based Proxy Blind Signature Scheme 被引量:3
10
作者 LANGWei-min YANGZong-kai +1 位作者 CHENGWen-qing TANYun-meng 《Wuhan University Journal of Natural Sciences》 CAS 2005年第3期555-558,共4页
An identity-based proxy blind signature scheme from bilinear pairings isintroduced, which combines the advantages of proxy signature and blind signature. Furthermore, ourscheme can prevent the original signer from gen... An identity-based proxy blind signature scheme from bilinear pairings isintroduced, which combines the advantages of proxy signature and blind signature. Furthermore, ourscheme can prevent the original signer from generating the proxy blind signature, thus the profitsof the proxy signer are guaranteed. We introduce bilinear pairings to minimize computationaloverhead and to improve the related performance of our scheme. In addition, the proxy blindsignature presented is non-repudiable and it fulfills perfectly the security requirements of a proxyblind signature. 展开更多
关键词 digital signature proxy signature blind signature identity-basedcryptography bilinear pairings
下载PDF
A Novel Post-Quantum Blind Signature for Log System in Blockchain 被引量:5
11
作者 Gang Xu Yibo Cao +4 位作者 Shiyuan Xu Ke Xiao Xin Liu Xiubo Chen Mianxiong Dong 《Computer Systems Science & Engineering》 SCIE EI 2022年第6期945-958,共14页
In recent decades, log system management has been widely studied fordata security management. System abnormalities or illegal operations can befound in time by analyzing the log and provide evidence for intrusions. In... In recent decades, log system management has been widely studied fordata security management. System abnormalities or illegal operations can befound in time by analyzing the log and provide evidence for intrusions. In orderto ensure the integrity of the log in the current system, many researchers havedesigned it based on blockchain. However, the emerging blockchain is facing significant security challenges with the increment of quantum computers. An attackerequipped with a quantum computer can extract the user's private key from thepublic key to generate a forged signature, destroy the structure of the blockchain,and threaten the security of the log system. Thus, blind signature on the lattice inpost-quantum blockchain brings new security features for log systems. In ourpaper, to address these, firstly, we propose a novel log system based on post-quantum blockchain that can resist quantum computing attacks. Secondly, we utilize apost-quantum blind signature on the lattice to ensure both security and blindnessof log system, which makes the privacy of log information to a large extent.Lastly, we enhance the security level of lattice-based blind signature under therandom oracle model, and the signature size grows slowly compared with others.We also implement our protocol and conduct an extensive analysis to prove theideas. The results show that our scheme signature size edges up subtly comparedwith others with the improvement of security level. 展开更多
关键词 Log system post-quantum blockchain LATTICE blind signature privacy protection
下载PDF
Efficient ID-Based Proxy Blind Signature Scheme 被引量:2
12
作者 ZHANG Qing WEN Qiaoyan CHEN Gengli 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期105-108,共4页
In a proxy blind signature scheme, the proxy signer is allowed to generate a blind signature on behalf of the original signer. The proxy blind signature scheme is useful in several applications such as e-voting and e-... In a proxy blind signature scheme, the proxy signer is allowed to generate a blind signature on behalf of the original signer. The proxy blind signature scheme is useful in several applications such as e-voting and e-payment. In this paper, we propose an identity-based proxy blind signature scheme which combines the advantages of proxy signature and of blind signature. Our scheme fulfills peffecdy the security requirements of a proxy blind signature. Comparing the previous scheme, our scheme needs less computational overhead and is more efficient. 展开更多
关键词 proxy signature blind signature IDENTITY-BASED bilinear pairings
下载PDF
A Proxy Blind Signature Scheme Based on DLP 被引量:2
13
作者 YU Baozheng XU Congwei 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期83-86,共4页
A proxy signature scheme allows an original signer to delegate his signing capability to a proxy signer who can sign on behalf of the original signer. A blind signature is the concept with a salient feature that the s... A proxy signature scheme allows an original signer to delegate his signing capability to a proxy signer who can sign on behalf of the original signer. A blind signature is the concept with a salient feature that the signer can not make a linkage between the blind signature and the identity of the requester. Proxy signature and blind signature are used widely in electronic commerce. With satisfying the security properties of both two signatures, a new proxy blind signature scheme based on discrete logarithm problem is proposed. 展开更多
关键词 discrete logarithm problem proxy signature blind signature electronic commerce
下载PDF
CONSTRUCTION OF PROXY BLIND SIGNATURE SCHEME BASED ON MULTI-LINEAR TRANSFORM 被引量:3
14
作者 ZhaoZemao LiuFengyu 《Journal of Electronics(China)》 2004年第6期505-510,共6页
A general method of constructing proxy blind signature is proposed based on multilinear transform. Based on this method, the four proxy blind signature schemes are correspondently generated with four different signatu... A general method of constructing proxy blind signature is proposed based on multilinear transform. Based on this method, the four proxy blind signature schemes are correspondently generated with four different signature equations, and each of them has four forms of variations of signs. Hence there are sixteen signatures in all, and all of them are proxy stronglyblind signature schemes. Furthermore, the two degenerated situations of multi-linear transform are discussed. Their corresponding proxy blind signature schemes are shown, too. But some schemes come from one of these degenerate situations are proxy weakly-blind signature scheme.The security for proposed scheme is analyzed in details. The results indicate that these signature schemes have many good properties such as unforgeability, distinguish-ability of proxy signature,non-repudiation and extensive value of application etc. 展开更多
关键词 Digital signature Proxy blind signature Multi-linear transform
下载PDF
A NEW EFFICIENT ID-BASED PROXY BLIND SIGNATURE SCHEME 被引量:2
15
作者 Ming Yang Wang Yumin 《Journal of Electronics(China)》 2008年第2期226-231,共6页
In a proxy blind signature scheme,the proxy signer is allowed to generate a blind signature on behalf of the original signer. The proxy blind signature scheme is useful in several applications such as e-voting,e-payme... In a proxy blind signature scheme,the proxy signer is allowed to generate a blind signature on behalf of the original signer. The proxy blind signature scheme is useful in several applications such as e-voting,e-payment,etc. Recently,Zheng,et al. presented an IDentity(ID) -based proxy blind sig-nature. In this paper,a new efficient ID-based proxy blind signature scheme from bilinear pairings is proposed,which can satisfy the security properties of both the proxy signatures and the blind signature schemes. Analysis of the scheme efficiency shows that the new scheme is more efficient than Zheng,et al.'s scheme. The proposed scheme is more practical in the real world. 展开更多
关键词 blind signature Proxy signature Bilinear pairing
下载PDF
Protection of mobile location privacy by using blind signature 被引量:1
16
作者 LIAO Jian QI Ying-hao +2 位作者 HUANG Pei-wei RONG Meng-tian LI Sheng-hong 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第6期984-989,共6页
Location privacy means a user keeps his/her geographical location secret. If location information falls into the wrong hands, an adversary can physically locate a person. To address this privacy issue, Qi et al.(2004a... Location privacy means a user keeps his/her geographical location secret. If location information falls into the wrong hands, an adversary can physically locate a person. To address this privacy issue, Qi et al.(2004a; 2004b) proposed a special and feasible architecture, using blind signature to generate an authorized anonymous ID replacing the real ID of a legitimate mobile user. The original purpose of his architecture was to eliminate the relationship of authorized anonymous ID and real ID. We present an algorithm to break out Qi’s registration and re-confusion protocol, and then propose a new mechanism based on bilinear pairings to protect location privacy. Moreover we show that the administrator or third parity cannot obtain information on the legitimate user’s authorized anonymous ID and real ID in our proposed protocols. 展开更多
关键词 Mobile computing Location privacy Security techniques and system blind signature Location-based services
下载PDF
Comment Fail-Stop Blind Signature Scheme Design Based on Pairings
17
作者 HU Xiaoming HUANG Shangteng 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1545-1548,共4页
Fail-stop signature schemes provide security for a signer against forgeries of an enemy with unlimited computational power by enabling the signer to provide a proof of forgery when a forgery happens. Chang et al propo... Fail-stop signature schemes provide security for a signer against forgeries of an enemy with unlimited computational power by enabling the signer to provide a proof of forgery when a forgery happens. Chang et al proposed a robust fail-stop blind signature scheme based on bilinear pairings. However, in this paper, it will be found that there are several mistakes in Chang et al's fail-stop blind signature scheme. Moreover, it will be pointed out that this scheme doesn't meet the property of a fail-stop signature: unconditionally secure for a signer. In Chang et al's scheme, a forger can forge a valid signature that can't be proved by a signer using the "proof of forgery". The scheme also doesn't possess the unlinkability property of a blind signature. 展开更多
关键词 fail-stop signature blind signature CRYPTANALYSIS CRYPTOGRAPHY
下载PDF
Fair E-Payment Protocol Based on Simple Partially Blind Signature Scheme
18
作者 LIU Jingwei SUN Rong KOU Weidong 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期181-184,共4页
This paper presents a simple partially blind signature scheme with low computation. By converse using the partially blind signature scheme, we build a simple fair e-payment protocol. In the protocol, two participants ... This paper presents a simple partially blind signature scheme with low computation. By converse using the partially blind signature scheme, we build a simple fair e-payment protocol. In the protocol, two participants achieve the goals of exchanging their digital signatures from each other in a simple way. An ado vantage of this scheme is that this approach does not require the intervention of the third party in any case. The low-computation property makes our scheme very attractive for mobile client and smart-card implementation in many e-commerce applications. 展开更多
关键词 electronic commerce E-PAYMENT Schnorr signature partial blind signature
下载PDF
An Efficient and Practical Quantum Blind Signature Protocol with Relaxed Security Model
19
作者 Jun Zhang Hao Xiao +1 位作者 Hongqun Zhai Xiaoli Meng 《Computers, Materials & Continua》 SCIE EI 2020年第4期301-313,共13页
Blind signature has a wide range of applications in the fields of E-commerce and block-chain because it can effectively prevent the blind signer from getting the original message with its blindness.Owing to the potent... Blind signature has a wide range of applications in the fields of E-commerce and block-chain because it can effectively prevent the blind signer from getting the original message with its blindness.Owing to the potential unconditional security,quantum blind signature(QBS)is more advantageous than the classical ones.In this paper,an efficient and practical quantum blind signature scheme relaxed security model is presented,where quantum superposition,decoy qubits and hash function are used for the purpose of blindness.Compared with previous QBS scheme,the presented scheme is more efficient and practical with a relaxed security model,in which the signer’s dishonest behavior can be detected other than being prevented as in other QBS schemes. 展开更多
关键词 blind signature quantum superposition decoy qubit hash function relaxed security model
下载PDF
An Efficient Threshold Blind Signature from Weil Pairing
20
作者 CHENGXiang-guo XUWei-dong WANGXin-mei 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期255-258,共4页
Threshold blind signature is playing an important role in cryptography as well as in practical applications such as e-cash and e-voting systems, etc. In this paper, we present an efficient and practical threshold bind... Threshold blind signature is playing an important role in cryptography as well as in practical applications such as e-cash and e-voting systems, etc. In this paper, we present an efficient and practical threshold bind signature from Weil pairing on super-singular elliptic curves or hyper-elliptic curves over finite field and prove that our scheme is provably secure in the random oracle model. 展开更多
关键词 signature scheme threshold blind signature Weil pairing GDH group
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部