期刊文献+

基于身份的门限受限部分盲签名方案 被引量:2

ID-based Threshold Restrictive Partially Blind Signature Scheme
下载PDF
导出
摘要 现有基于身份的盲签名方案安全性依赖于可信私钥产生机构,结合受限部分盲签名和门限性质,利用双线性对实现一种新的基于身份的部分盲签名方案。分析结果表明,与同类签名方案相比,该方案在保持高效性的同时,具有更多安全特性,其整体安全性较高。 Aiming at the problem of current ID-based blind signature scheme that its security is based on the trusted Private Key Generator(PKG), this paper realizes an ID-based partially blind signature scheme by using bilinear pairing. The scheme combines restrictive partial blind signature and threshold properties. Analysis results show that compared with the related research, this scheme maintains efficiency while ensuring higher security and bringing in more security properties.
出处 《计算机工程》 CAS CSCD 北大核心 2010年第11期117-119,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60573054)
关键词 基于身份 门限签名 受限部分盲签名 不可信私钥产生机构 ID-based threshold signature restrictive partially blind signature untrusted Private Key Generator(PKG)
  • 相关文献

参考文献6

  • 1Zhang Fangguo, Kim K. ID-based Blind Signature and Ring Signature from Pairings[C]//Proc. of ASIACRYPT'02. Berlin, Germany: Springer-Verlag, 2002: 533-547. 被引量:1
  • 2Zhang Fangguo, Kim K. Efficient ID-based Blind Signature and Proxy Signature from Bilinear Pairings[C]//Proc. of Australasian Conference on Information Security and Privacy. Berlin, Germany: Springer-Verlag, 2003: 312-323. 被引量:1
  • 3Chen Xiaofeng, Zhang Fangguo. /D-based Restrictive Partially Blind Signatures[C]//Proc. of Conference on Computational Intelligence and Security. Berlin, Germany: Springer-Verlag, 2005: 117-124. 被引量:1
  • 4崔巍,辛阳,胡程瑜,杨义先,李忠献.高效的基于身份的(受限)部分盲签名[J].北京邮电大学学报,2008,31(4):53-57. 被引量:20
  • 5Chen Xiaofeng, Zhang Fangguo. New ID-based Threshold Signature Scheme from Weil Pairing[C]//Proc. of INDOCRYPT'04. Berlin, Germany: Springer-Verlag, 2004:371-383. 被引量:1
  • 6许艳,于佳,李大兴.基于身份的动态门限盲签名方案[J].山东大学学报(理学版),2008,43(1):55-59. 被引量:1

二级参考文献17

  • 1SHAMIR A.Identity-based cryptosystems and signature schemes[C]//B Blakely Proc Of Crypto'84,LNCS 196.Berlin:Springer-Verlag,1984:47- 53. 被引量:1
  • 2BONEH D,FRANKLIN M.Identity based encryption from the Weil pairing[C]// J Kilian Advances in Cryptology-Crypto 2001,LNCS 2139.Berlin:Springer-Verlag,2001:213-229. 被引量:1
  • 3BAEK J,ZHENG Y.Identity-based threshold decryption[C]// F Bao Public Key Cryptography Proceedings of PKC'04,LNCS 2947.Berlin:Springer-Verlag,2004:262-276. 被引量:1
  • 4CHEN Xiaofeng,ZHANG Fangguo,KONIDALA D M,et al.New ID-based threshold signature scheme from Weil pairing[C]// INDOCRYPT2004,LNCS 3348.Berlin:Springer-Verlag,2004:371-383. 被引量:1
  • 5CHAUM D.Blind signatures for untraceable payments[C]//Advances in Cryptology-CRYPTO'82,New York:Spring-Verlag,1983:199-203. 被引量:1
  • 6MAITLAND G,BOYD C.A provably secure restrictive partially blind signature scheme[C]// PKC'02,LNCS2274,Berlin:Springer-Verlag,2002:99-114. 被引量:1
  • 7HERABERG A,JARECKI S,KRAWCZYK H,et al.Proactive secret sharing,or:Howto cope with perpetual leakage[C]//D Coppersmith Advances in Crytptolgy-Crypto'95 Proceedings,LNCS 963.Berlin:Springer-Verlag,1995:339-352. 被引量:1
  • 8CHAUM D,PEDERSEN T P.Transferred cash grows in size[C]//R A Rueppel,Advances in Cryptology-Eurocrypt'92.proceedings,LNCS 658.Berlin:Springer-Verlag,1993:390-407. 被引量:1
  • 9GIRAULT M.Self-certifie public key[C]// Advances in Cryptology-Eurocrypt'91 proceedings,LNCS 547,Berlin:Springer-Verlag,1991:490-497. 被引量:1
  • 10CHEN Xiaofeng,ZHANG Fangguo,Kwangjo Kim.New ID-based threshold signature scheme from bilinear pairings[C]//Indocrypt'04,LNCS 3348,Berlin:Springer-Verlag,2004:371-383. 被引量:1

共引文献19

同被引文献12

  • 1陆洪文,郑卓.基于双线性对的门限部分盲签名方案[J].计算机应用,2005,25(9):2057-2059. 被引量:8
  • 2彭华熹,冯登国.一个基于双线性映射的前向安全门限签名方案[J].计算机研究与发展,2007,44(4):574-580. 被引量:13
  • 3Chaum D. Blind signatures for untraceable payments[C]// Proc of CRYPTO 82. New York, USA: Plenum Press, 1983: 199--203. 被引量:1
  • 4Zhang Fangguo, Kim K. ID-based blind signature and ring signature from pairings[C]//Proc of ASIACRYPT' 02. Berlin.. Springer-Verlag, 2002 .. 533--547. 被引量:1
  • 5Vo D L, Zhang F, Kim K. A new threshold blind signature scheme from pairings[C]//SCIS2003. New York: ACM Press, 2003 .. 26-- 29. 被引量:1
  • 6Baek J, Zheng Y. Identity-based threshold signature scheme from the bilinear pairings[C]//IAS'04 Track of ITCC'04. Los Alamitos: IEEE Computer Society Press, 2004: 124--128. 被引量:1
  • 7Bellare M, Miner S K. A forward secure digital signature seheme[C]//Proe of the 19th Annual International Cryp- tology Conference Advances in Cryptology. London: Springer-Verlag, 1999 : 431 -- 4481. 被引量:1
  • 8Fiat A,Shamir A. How to prove yourself practical solutions of identification and signature problems[C]//Proc of Ad- vances in Cryptology, CRYPTO 86. London: Springer-Ver- lag, 1987 : 186--194. 被引量:1
  • 9Ostrovsky R, Yung M. How to withstand mobile virus at- tacks [C]//The 10th Annual Symp on Principles of Distrib- uted Computing (PODC 91 ), Montreal, Quebec, Canada, 1991:51--59. 被引量:1
  • 10曹珍富.The multi-dimension RSA and its low exponent security[J].Science China(Technological Sciences),2000,43(4):349-354. 被引量:10

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部