期刊文献+

无证书的代理盲签名方案 被引量:5

Certificateless proxy blind signature scheme
下载PDF
导出
摘要 结合代理签名和盲签名的特点,提出了一种无证书的代理盲签名方案。新方案采用了无证书公钥密码体制,解决了基于证书签名方案的证书管理问题和基于身份签名方案的密钥托管问题。分析表明,该方案不仅满足代理盲签名所要求的所有性质,而且方案中密钥生成中心(KGC)与用户间不再需要可信的安全通道,更加适合实际应用。 A certificateless proxy blind signature scheme is presented,which satisfies the security properties of both proxysignature scheme and blind signature scheme.Based on certificateless public cryptosystem,it avoids the using of certificate incertificate-based signature scheme and removes key escrow in ID-based signature scheme.Analysis shows that the proposedscheme can satisfy all the required properties of a proxy blind signature,and it does not need the confidential channel be-tween KGC and users
出处 《计算机工程与应用》 CSCD 北大核心 2011年第13期110-112,共3页 Computer Engineering and Applications
基金 国家自然科学基金No.60842006 部委科研基金课题~~
关键词 无证书公钥密码体制 代理盲签名 双线性对 eertificateless public key cryptography proxy blind signature bilinear pairing
  • 相关文献

参考文献5

  • 1AI-Riyami S S,Paterson K G.Certificateless public key ctyptography[C] /LNCS 2894:Asiacrypt2003.Bedin:Springer-Verlag,2003:273-452. 被引量:1
  • 2Chanm D.Blind signature for untraceable payments[C] //Advences in Cryptology-Crypto82,Plenum,NY,1983:199-203. 被引量:1
  • 3Mambo M,Usdun K,Okamoto E.Proxy signature:Delegation of the power to sign messages[J].IEICE Transactions on Foundations,1996,E792A(9):1338-1353. 被引量:1
  • 4Lin W,Jan J K.A security personal learning tools using a proxy bind signature scheme[C] //Proceedings of International Conference on Chinese Language Computing.USA:Chinesc Language Computer Society Knowledge Systems Institute,2000:273-277. 被引量:1
  • 5谭作文,刘卓军,唐春明.基于离散对数的代理盲签名(英文)[J].软件学报,2003,14(11):1931-1935. 被引量:91

二级参考文献11

  • 1Stinson DR. Crvotoaraohv Theory and Practice. 2nd ed., New York: CRC Press, 2002. 282-285. 被引量:1
  • 2Tan ZW, Liu ZJ. Tang CM. Digital proxy blind signature schemes based on DLP and ECDLP. Vol.21, Beijing: Key Laboratory of Mathematics Mechanization Research, Academy of Mathematics and Systems Science, the Chinese of Academy of Sciences, 2002. 212-217. 被引量:1
  • 3Chaum D. Blind signature systems. In: Chaum D, ed. Proceedings of the Crypto'83. New York: Springer-Vedag, 1998. 153-156. 被引量:1
  • 4Chaum D, Fiat A, Naor M. Untraceable electronic cash. In: Goldwasser S, ed. Proceedings of the Crypto'88. LNCS 403, New York: Springer-Vedag, 1990. 319-327. 被引量:1
  • 5Chaum D, Boen B, Heyst E, Mjolsnes S, Steenbeek A. Efficient off-line electronic check. In: Quisquater J. Vandewalle J, eds. Proceedings of the Eurocrypt'89. LNCS 434, Berlin: Springer-Verlag, 1990. 294-301. 被引量:1
  • 6Brands S. Untraceable off-line cash in wallets with observers. In: Douglas RS, ed. Proceexlings of the Crypto'93. LNCS 773, New York: Springer-Verlag, 1994. 302-318. 被引量:1
  • 7Mambo M, Usuda K,Okamoto E. Proxy signatures for delegating signing operation. In: Proceedings of the 3rd ACM Conference on Computer and communications Security. New Delhi: ACM Press, 1996.48-57. 被引量:1
  • 8Lee B, Kim H, Kim K. Strong proxy signature and its applications. In: Proceedings of the 2001 Symposium on Cryptography and Information Security (SCIS 2001). 2001. 被引量:1
  • 9Zhang K. Threshold proxy signature schemes. In: Okamoto E, Davida G, Mambo M, eds. Proceedings of the Information Security Workshop 1997. LNCS 1396, Berlin: Springer-Verlag, 1998. 191-197. 被引量:1
  • 10Hsu CL, Wu TS, Wu TC. Improvement of threshold proxy signature scheme. Applied Mathematics and Computation, 2003,136:315-321. 被引量:1

共引文献90

同被引文献40

  • 1王蜀洪,王贵林,鲍丰,王杰.对一个基于离散对数代理盲签名的密码分析(英文)[J].软件学报,2005,16(5):911-915. 被引量:22
  • 2王天银,蔡晓秋,张建中.基于双线性对的新型代理盲签名方案[J].计算机应用研究,2007,24(2):130-131. 被引量:3
  • 3蔡光兴,陈华.一种新的基于身份的代理盲签名方案[J].计算机工程,2007,33(9):145-147. 被引量:7
  • 4Chaum D. Blind signatures for untraceable payments[C]//Ad- vances in Cryptology Crypto' 82, LNCS, 1982 : 199-203. 被引量:1
  • 5Mambo M, Usuda K, Okamoto E. Proxy signature: delega- tion of the power to sign message[J]. IEICE Transactions on Fundamentals, 1996,79(9) : 1338- 1353. 被引量:1
  • 6Lin W D,Jan J K. A security personal learning tools using a proxy blind signature scheme[C]//Proceedings of Interna- tional Conference on Chinese Language Computing. Was- hington: IEEE Computer Society,2000:273-277. 被引量:1
  • 7Tan Zhuowen, Liu Zuojun, Tang Chunming. Digital proxy blind signature schemes based on DLP and ECDLP[J]. M M Research Preprints,2002,21(7) : 212-217. 被引量:1
  • 8Boneh D, Franklin M. Identity-based encryption from the weil pairing[C]//Proc of Lecture Notes in Computer Sc- ience, Vol 2139. Berlin.. Springer-Verlag, 2001 : 213- 229. 被引量:1
  • 9Wang Xiao-yun,Yu Hong-bo. How to break MD5 and oth- er hash funetions[C]//Cramer R. LNCS 3494: Advances in Cryptology-Eurocrypt, 2005. Springer, 2005 : 19 - 35. 被引量:1
  • 10AI-Riyami S S, Paterson K G.Certificateless public key cryptography[C]//Proceedings of ASIACRYPT 2003.Berlin: Springer-Verlag, 2003,2894 : 452-473. 被引量:1

引证文献5

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部