期刊文献+

一个前向安全的盲代理签名方案设计与分析 被引量:1

Design and Analysis of a Forward Secure Blind Proxy Signature Scheme
下载PDF
导出
摘要 盲代理签名是指原始签名人不能直接根据代理签名辨认出代理签名人身份的代理签名方案.本文首次将前向安全的数学思想引入到盲代理签名体制,提出了前向安全的盲代理签名方案.新方案能实现即使代理签名人的盲代理签名密钥被泄露,密钥泄露前所产生的代理签名依然有效.同时通过引入时效参数,新方案可以对盲代理签名的有效时间进行控制. The properties of blind proxy signature scheme are that the original signer can not identify the proxy signer through a proxy signature and the proxy signer can blindly sign a message. This paper pro- posed a forward secure blind proxy signature scheme combining the concept of forward security with blind proxy signature in the first time. This means' even if an adversary has gotten the current blind proxy sign- ers' key. It could not forge proxy signature pertaining to the past, that is, previous generated blind proxy signatures remain still valid. Furthermore, the scheme can control the proxy signature time of the proxy blind singer.
出处 《湘潭大学自然科学学报》 CAS CSCD 北大核心 2009年第2期139-143,共5页 Natural Science Journal of Xiangtan University
基金 国家自然科学基金资助项目(50677058) 国家科技支撑计划资助项目(2006BAJ05A01 2008BAK49B02) 长沙理工大学资助项目
关键词 前向安全 代理签名 盲代理签名 安全性分析 forward security proxy signature blind proxy signature security analysis
  • 相关文献

参考文献15

二级参考文献37

  • 1[1]Mambo M, Usuda K, Okamoto E. Proxy signature: Delegation to sign messages. IEICE Transactions on Fundamentals, 1996,E79-A (9): 1338~1354
  • 2[2]Kim S, Park S, Won D. Proxy signatures, revisited. In: Lecture Notes in Computer Science 1334, Berlin: Springer-Verlag, 1997, 1334:223~232
  • 3[3]Zhang K. Threshold proxy signature scheme. In:Proceedings of Information Security Workshop, Japan, 1977. 101 ~ 109
  • 4[4]Yi L J, Bai G Q, Xiao G Z. Proxy multi-signature scheme: A new type of proxy signature scherne. Electronics Letters, 2000,36(6) :527~528
  • 5Mambo M., Usuda K., Okamoto E.. Proxy signature: Delegation of the power to sign messages. IEICE Transactions of Fundamentals, 1996, E79-A (9): 1338~1354.
  • 6Yi Li-Jiang, Bai Guo-Qiang, Xiao Guo-Zhen. Proxy multi-signatures, a new type of proxy signature schemes. Electronics Letters on Information Theory-Correlation Theory, 2000, 24(6): 527~528.
  • 7Lee B., Kim H., Kim K.. Strong proxy signature and its applications. In: Proceedings of the 2001 Symposium on Cryptography and Information Security-SCIS'01, Oiso, Japan, 2001, 603~608.
  • 8Wang Gui-Lin, Bao Feng, Zhou Jian-Ying, Deng Robert H.. Security analysis of some proxy signatures. In: Proceedings of the Information Security and Cryptology-ICIS'03, Seoul,Korea, 2003, 305~319.
  • 9MAMBO M,USUDA K,OKAMOTO E.Proxy signatures:delegation of the power to sign messages[J].IEICE Trans on Fundamentals,1996,E792A(9):1338-1354.
  • 10MAMBO M,USUDA K,OKAMOTO E.Proxy signatures[A].Proceedings of the 1995 Symposium on Cryptography and Information Security(SCIS 95)[C].Inuyama,Japan,1995.1-171.

共引文献42

同被引文献11

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部