期刊文献+

新的无证书的门限代理盲签名方案 被引量:2

New certificateless threshold proxy blind signature scheme
下载PDF
导出
摘要 代理盲签名兼具代理签名和盲签名的优点,同时其具备可扩展性,得到了广泛的关注和研究。针对普通代理盲签名方案中存在代理者权限过大的问题,新方案引入了基于秘密分享思想的门限签名技术,构造了一种新的无证书的门限代理盲签名方案,详细分析了方案的实现过程。分析表明,该方案易于实现,并且能在随机预言下证明其安全性。新方案能够很好地应用在电子投票、电子政务等要求代理签名且需要保护隐私的场合。 Proxy blind signatures with extended properties are being thought highly of expandability and widely researched in recent years,because they have both the features of proxy signatures and blind signatures.In traditional proxy blind signature,proxy signer's authority is too big and it will change the original signer's will.The new scheme introduced threshold signature technology,based on secret share thoughts,and constructed threshold proxy blind signature with certificateless cryptography.The scheme implementation process with detailed analysis shows that this scheme is easy to realize,and verifies its security under the random oracle machine.It can be a good application in electronic voting and e-government affairs where user's privacy should be protected.
出处 《计算机应用》 CSCD 北大核心 2012年第11期3140-3142,共3页 journal of Computer Applications
基金 国家自然科学基金资助项目(60873247) 国家社会科学基金资助项目(12BXW040) 山东省自然科学基金资助项目(ZR2009GZ007 ZR2011FM030)
关键词 双线性对 无证书密码体制 门限 代理盲签名 随机预言机 bilinear pairing certificateless cryptography threshold proxy blind signature random oracle machine
  • 相关文献

参考文献13

  • 1AL-RIYAMI S S, PATERSON K G. Certificateless public key cryptography[ C] // Advance in Cryptography Asiacrypt 2003, LNCS 2894. Berlin: Springer-Verlag, 2003:452 -473. 被引量:1
  • 2CHAUM D. Blind signatures for untraceable pryment[ C]// Crypto' 82: Advances in Cryptology. Berlin: Springer, 1952:199 -203. 被引量:1
  • 3MAMBO M, USUDA K, OKAMOTO E. Proxy signature: Delegation of the power to sign messages[ J]. IEICE Transactions on Fundamentals, 1996, E792A (9): 1338- 1353. 被引量:1
  • 4LEE W B, CANG C Y. Efficient proxy signatures scheme based on discrete logarithm[ C]// Proceedings of 10 th Conference on Information Security. Washington, DC: IEEE Computer Society, 2000:4-7. 被引量:1
  • 5AMIT K A, SUNDER L. Proxy blind signature scheme[ EB/OL]. [ 2012 - 04 - 15]. http://eprint. iaer. org/2003/72. 被引量:1
  • 6HUB C, WONG D S, ZHANG ZHENFENG, et al. Certifieateless signature: A new security model and an improved generic construction [J]. Designs, Codes and Cryptography, 2007, 42(2) : 109 - 126. 被引量:1
  • 7ZHANG ZHENFENG, WONG D S, XU JING, et al. Certificateless public-key signature: security model and efficient construction [ C]// Proceedings of Applied Cryptography and Network Security, LNCS 3989. Berlin: Springer-Verlag, 2006:293 - 308. 被引量:1
  • 8张建中,魏春艳.一种新的无证书代理签名方案[J].计算机工程,2010,36(10):168-169. 被引量:16
  • 9魏春艳,蔡晓秋.新的无证书代理盲签名方案[J].计算机应用,2010,30(A12):3341-3342. 被引量:11
  • 10DESMEDT Y, FRANKEL Y. Shared generation of authenticators and signatures[ C]// Advances in Cryptology, LNCS 576. Berlin: Springer-Verlag, 1991:457 -469. 被引量:1

二级参考文献33

共引文献79

同被引文献33

  • 1曹正军,刘木兰.数字签名方案中的孤悬因子和冗余数据[J].计算机学报,2006,29(2):249-255. 被引量:15
  • 2Zhang Z H, Li J J, Jiang W, et al. A new anonymous au- thentication scheme for cloud computing[ C]// The 7th In- ternational Conference on Computer Science& Education, Melbourn: 2012 : 14-17. 被引量:1
  • 3Zhang Z H, Jiang X F, Li J J, et al. An identity-based au- thentication scheme in cloud computing[ C ]// 2012 Inter- national Conference on Industrial Control and Electronics Engineering. Xi' an: 2012: 984-986. 被引量:1
  • 4Banyal R K, Jain P, Jain V K. Multi-factor Authentication Framework for Cloud Computing[ C ]// 2013 Fifth Interna- tional Conference on Computational Intelligence, Modeling and Simulation. Seoul :IEEE,2013, 105-110. 被引量:1
  • 5Ysssin A A, Jin H, Ibrahim A, et al. Efficient password- based two factors authentication in cloud computing [ J ]. International Journal of Security and its Applications, 2012, 6(2) : 143-148. 被引量:1
  • 6Huang J J, Juang W S, Fan C, et al. Robust and privacy protection authentication in cloud computing. International [ J ]. Journal of Innovative Computing, Information and Control, 2013, (11) :4247-4261. 被引量:1
  • 7刘振鹏,吴凤龙,尚开雨.基于TPM的云计算平台双向认证方案[J].通信学报,2012,33(22):20-24. 被引量:2
  • 8Ding W, Ma C G. Cryptanalysis of a remote user authenti- cation scheme for mobile client-server environment based on ECC[J]. Information Fusion, 2013(14) :498-503. 被引量:1
  • 9Santhosh B S, Gokulraj K. An enhanced dynamic mutual authentication scheme for smart card based networks [ J].Computer Network and Information Security, 2012, 4 (4) :30-38. 被引量:1
  • 10Cao X F, Kou W D, Du X N. A pairing-free identity- based authenticated key agreement protocol with minimal message exchanges [ J]. Information Sciences, 2010, 180 ( 15 ) : 2895-2903. 被引量:1

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部