期刊文献+

对一种基于身份的代理盲签名方案的改进

An Improved ID-Based Proxy Blind Signature Scheme
下载PDF
导出
摘要 盲性是代理盲签名的一个重要特性。通过分析文献[1],发现其不具有盲性,对其进行了改进,改进后的方案克服了原方案的安全隐患,并且保留了原方案的其它优点。 The blindness is an important property of a proxy blind signature scheme. Analysis of Chen Ling- ling et al's one efficient id - based proxy blind signature shows that it doesn' t meet blindness. In this paper, an improvement is proposed, which not only mends the security risk but also retains the merits of the original id - based proxy blind signature scheme.
作者 杜春粉 周梦
出处 《盐城工学院学报(自然科学版)》 CAS 2009年第2期51-53,57,共4页 Journal of Yancheng Institute of Technology:Natural Science Edition
关键词 基于身份 双线性映射 代理签名 盲签名 代理盲签名 identity - based hilinear pairings proxy signature blind signature proxy blind signature
  • 相关文献

参考文献6

  • 1陈玲玲,亢保元,张磊.一种高效的基于身份的代理盲签名方案[J].华东交通大学学报,2008,25(1):113-116. 被引量:8
  • 2MAMBO M,USUDA K,O KAMOTO E.Proxy signatures:delegation of the power to sign messages[J].IEICE Transaction on Fundamentals,1996,E792A(9):1338-1354. 被引量:1
  • 3CHAUM D.Blind signature for untraceable payments[A]//Proc.of the Crypto'82.New York:Springer-Verlag,1983:199-203. 被引量:1
  • 4Lin W,Jan J K.A Security Personal Learning Tools Using a Proxy Blind Signature Scheme[A]//Proceedings of International Conference on Chinese Language Computing.USA:Chinese Language Computer Society Knowledge Systems Institute,2000:273-277. 被引量:1
  • 5谭作文,刘卓军,唐春明.基于离散对数的代理盲签名(英文)[J].软件学报,2003,14(11):1931-1935. 被引量:91
  • 6Shamir A..Identity-based cryptosystems and signature schemes[A].Blaldey G R,Chaum D.Advances in Cryptologu:CRYPTO 1982[C].Berlin:Springer,1984:47-53. 被引量:1

二级参考文献12

  • 1Stinson DR. Crvotoaraohv Theory and Practice. 2nd ed., New York: CRC Press, 2002. 282-285. 被引量:1
  • 2Tan ZW, Liu ZJ. Tang CM. Digital proxy blind signature schemes based on DLP and ECDLP. Vol.21, Beijing: Key Laboratory of Mathematics Mechanization Research, Academy of Mathematics and Systems Science, the Chinese of Academy of Sciences, 2002. 212-217. 被引量:1
  • 3Chaum D. Blind signature systems. In: Chaum D, ed. Proceedings of the Crypto'83. New York: Springer-Vedag, 1998. 153-156. 被引量:1
  • 4Chaum D, Fiat A, Naor M. Untraceable electronic cash. In: Goldwasser S, ed. Proceedings of the Crypto'88. LNCS 403, New York: Springer-Vedag, 1990. 319-327. 被引量:1
  • 5Chaum D, Boen B, Heyst E, Mjolsnes S, Steenbeek A. Efficient off-line electronic check. In: Quisquater J. Vandewalle J, eds. Proceedings of the Eurocrypt'89. LNCS 434, Berlin: Springer-Verlag, 1990. 294-301. 被引量:1
  • 6Brands S. Untraceable off-line cash in wallets with observers. In: Douglas RS, ed. Proceexlings of the Crypto'93. LNCS 773, New York: Springer-Verlag, 1994. 302-318. 被引量:1
  • 7Mambo M, Usuda K,Okamoto E. Proxy signatures for delegating signing operation. In: Proceedings of the 3rd ACM Conference on Computer and communications Security. New Delhi: ACM Press, 1996.48-57. 被引量:1
  • 8Lee B, Kim H, Kim K. Strong proxy signature and its applications. In: Proceedings of the 2001 Symposium on Cryptography and Information Security (SCIS 2001). 2001. 被引量:1
  • 9Zhang K. Threshold proxy signature schemes. In: Okamoto E, Davida G, Mambo M, eds. Proceedings of the Information Security Workshop 1997. LNCS 1396, Berlin: Springer-Verlag, 1998. 191-197. 被引量:1
  • 10Hsu CL, Wu TS, Wu TC. Improvement of threshold proxy signature scheme. Applied Mathematics and Computation, 2003,136:315-321. 被引量:1

共引文献95

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部