期刊文献+

一种前向安全的代理盲签名方案 被引量:10

A Forward Secure Proxy Blind Signature Scheme
原文传递
导出
摘要 盲签名是指签名人不知道所签消息的具体内容。代理签名是指原始签名人将签名权力委托给代理签名人,由代理签名人代表原始签名人对消息进行签名。结合了两者优点的代理盲签名是密码学领域的热点。文章将前向安全的概念引入到代理盲签名体制,提出了一个前向安全的代理盲签名方案。新方案能实现即使代理签名人的代理盲签名密钥被泄露,密钥泄露前所产生的代理盲签名依然有效。另外,通过引入时效参数,新方案可以对代理盲签名的有效时间进行控制。 Proxy signature allows an original signer to trust his/her signing power to a proxy signer so that the proxy signer could sign messages on behalf of the original signer. Blind signature allows a user to have a given message signed by the signer without revealing any information about the message. The proxy blind signature scheme, which satisfies the security properties of both the blind signature scheme and the proxy signature scheme, has become the focus in the field of cryptography. This paper proposes a forward secure proxy blind signature scheme combining the concept of forward security with proxy blind signature. This means that even if an adversary has got the current proxy blind signers' key, it is impossible to forge proxy blind signature pertaining to the past, and the previously-generated proxy blind signatures remain valid. Furthermore, the scheme could control the proxy signature time of the proxy blind singer
出处 《通信技术》 2009年第5期193-196,共4页 Communications Technology
基金 国家自然科学基金资助项目(50677058) 国家科技支撑计划项目(2006BAJ05A01 2008BAK49B02) 长沙理工大学资助项目。
关键词 前向安全 代理签名 盲签名 代理盲签名 安全分析 forward security proxy signature blind signature proxy blind signature security analysis
  • 相关文献

参考文献14

  • 1Chaum D. Blind signature for untraceable payments[C]. New York: Springer-Verlag, 1983:199-203. 被引量:1
  • 2Chaum D, Fiat A, Naor M. Untraceable electronic cash[C]// Goldwasser S (Ed.). Advances in Cryptology CRYPTO '88, LNCS 403, Berlin Heidelberg:Springer-Yerlag, 1990:319-327. 被引量:1
  • 3Brands S. Untraceable off-line cash in wallets with observers[C]// Proceedings of the Crypto' 93. LNCS 773, New York: Springer-Yerlag, 1994:302-318. 被引量:1
  • 4Chaum D, Boen B, Heyst E, et al. Efficient off-line electronic check[C]//Quisquater J, Vandewalle J(Ed.) Proceedings of the Eurocrypt' 89. LNCS 434, New York: Springer-Verlag, 1990:294-301. 被引量:1
  • 5Mambo M, Usuda K, Okamoto E. Proxy signatures for delegating signing operation[C]//Proc, of the 3rd ACM Conf. on Computer and Communication Security. New Delhi, India: ACM Press, 1996:48-57. 被引量:1
  • 6Lin W D, Jan J K. A Security Personal Learning Tools Using a Proxy Blind Signature Scheme [C]// Proceedings of International Conference on Chinese Language Computing, Illinois, USA:[s.n.], 2000: 273-277. 被引量:1
  • 7谭作文,刘卓军,唐春明.基于离散对数的代理盲签名(英文)[J].软件学报,2003,14(11):1931-1935. 被引量:91
  • 8Tan Z W, Liu Z J, Tang C M. Digital proxy blind signature schemes based on DLP and ECDLP[C]// Key Laboratory of Mathematics Mechanization Research, Academy of Mathematics and Systems Science, the Chinese of Academy of Sciences, 2002: 212-217. 被引量:1
  • 9Awasthi L S. A Proxy Blind Signature Scheme "Revised Version" [J]. Transaction on Cryptology, 2005, 2(01) : 5-11. 被引量:1
  • 10Cunther C. An identity-based key-exchange protocol[C]. [s. l.]: Lecture Notes in Computer Science, 1989: 29-37. 被引量:1

二级参考文献11

  • 1Stinson DR. Crvotoaraohv Theory and Practice. 2nd ed., New York: CRC Press, 2002. 282-285. 被引量:1
  • 2Tan ZW, Liu ZJ. Tang CM. Digital proxy blind signature schemes based on DLP and ECDLP. Vol.21, Beijing: Key Laboratory of Mathematics Mechanization Research, Academy of Mathematics and Systems Science, the Chinese of Academy of Sciences, 2002. 212-217. 被引量:1
  • 3Chaum D. Blind signature systems. In: Chaum D, ed. Proceedings of the Crypto'83. New York: Springer-Vedag, 1998. 153-156. 被引量:1
  • 4Chaum D, Fiat A, Naor M. Untraceable electronic cash. In: Goldwasser S, ed. Proceedings of the Crypto'88. LNCS 403, New York: Springer-Vedag, 1990. 319-327. 被引量:1
  • 5Chaum D, Boen B, Heyst E, Mjolsnes S, Steenbeek A. Efficient off-line electronic check. In: Quisquater J. Vandewalle J, eds. Proceedings of the Eurocrypt'89. LNCS 434, Berlin: Springer-Verlag, 1990. 294-301. 被引量:1
  • 6Brands S. Untraceable off-line cash in wallets with observers. In: Douglas RS, ed. Proceexlings of the Crypto'93. LNCS 773, New York: Springer-Verlag, 1994. 302-318. 被引量:1
  • 7Mambo M, Usuda K,Okamoto E. Proxy signatures for delegating signing operation. In: Proceedings of the 3rd ACM Conference on Computer and communications Security. New Delhi: ACM Press, 1996.48-57. 被引量:1
  • 8Lee B, Kim H, Kim K. Strong proxy signature and its applications. In: Proceedings of the 2001 Symposium on Cryptography and Information Security (SCIS 2001). 2001. 被引量:1
  • 9Zhang K. Threshold proxy signature schemes. In: Okamoto E, Davida G, Mambo M, eds. Proceedings of the Information Security Workshop 1997. LNCS 1396, Berlin: Springer-Verlag, 1998. 191-197. 被引量:1
  • 10Hsu CL, Wu TS, Wu TC. Improvement of threshold proxy signature scheme. Applied Mathematics and Computation, 2003,136:315-321. 被引量:1

共引文献91

同被引文献63

引证文献10

二级引证文献37

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部