期刊文献+

一个可证安全的高效的代理盲签名方案 被引量:3

An efficient and provably secure proxy blind signature scheme
下载PDF
导出
摘要 代理盲签名结合了代理签名和盲签名的优点,在电子商务等领域有着广阔的应用前景。目前大多数代理盲签名的安全性是启发式分析,没有形式化证明,并且大多没有考虑多一伪造攻击。提出了一个新型的代理盲签名安全模型,并在该模型下提出了一个基于双线性对的代理盲签名方案,并在随机预言机模型下,证明了其在选择消息/授权文件攻击下是不可伪造的,其安全性可分别规约为CDH问题和Chosen-Target CDH问题。分析表明,该方案满足代理盲签名的主要安全要求,而且和已有的方案相比,本方案更加高效。 By combining the advantages of blind signatures w nature can be widely applied in many fields, such as e-commerce. blind signature schemes only give some heuristic explanations w proxy signatures, a proxy blind sig- urrently, most of the proposed proxy out formal proof, and one-more for- gery is seldom considered in many schemes. In the paper, we propose a novel efficient security model and a proxy blind signature scheme based on bilinear parings. The scheme is unforgeable against adap- tive chosen message/warrant attacks under the Computational Diffie-Hellman assumption and Chosen- Target Computational Diffie-Hellman assumption in the random oracle model. The analysis shows that the proposed scheme can satisfy the main secure properties of a proxy blind signature. Furthermore, the scheme is more efficient than traditional ones.
作者 周明 王箭
出处 《计算机工程与科学》 CSCD 北大核心 2015年第9期1643-1651,共9页 Computer Engineering & Science
关键词 代理盲签名 双线性对 随机预言机 多一伪造 proxy blind signature bilinear pairing random oracle model one-more forgery
  • 相关文献

参考文献18

  • 1Chaum D. Blind signatures for untraceable payments[C]// Proc of Advances in Cryptology, 1983:199-203.
  • 2Mambo M, Usuda K, Okamoto E. Proxy signatures: Delega tion of the power to sign messages[J]. IEICE Transactions on Fundamentals of Electronics, Communications and Com- puter Sciences,1996,79(9) :1338 1354.
  • 3Lin W D,Jan J K. A security personal learning tools using a proxy blind signature scheme[C] //Proc of International Conference on Chinese Language Computing,2000:273-277.
  • 4Tan Z. An off-line electronic cash scheme based on proxy blind signatureEJ ]. The Computer Journal, 2011,54 (4) : 505- 512.
  • 5Su J, Liu J. A proxy blind signature scheme based on DLP [C: //Proc of 2010 International Conference on Internet Technology and Applications, 2010 : 1-4.
  • 6ZHANG Qing,WEN Qiaoyan,CHEN Gengli.Efficient ID-Based Proxy Blind Signature Scheme[J].Wuhan University Journal of Natural Sciences,2007,12(1):105-108. 被引量:2
  • 7Gu C,Zhu Y. An efficient ID-based proxy signature scheme from pairings[C]//Proc of Information Security and Cryptol- ogy,2008:40-50.
  • 8Zhang B,Xu Q. Certificateless proxy blind signature scheme from bilinear pairings:C://Proc of the 2nd International Workshop on Knowledge Discovery and Data Mining, 2009: 573-576.
  • 9Yu Y,Mu Y,Wang G,et al. Cryptanalysis of an off-line elec- tronic cash scheme based on proxy blind signature[J]. The Computer Journal,2011,54(10) :1645-1651.
  • 10Huang X, Mu Y, Susilo W, et al. A short proxy signature scheme: Efficient authentication in the ubiquitous world [C: //Proc of EUC 2005 Workshops on Embedded and Ubiqui- tous Computing, 2005 : 480 489.

二级参考文献18

  • 1张学军,王育民.高效的基于身份的代理盲签名[J].计算机应用,2006,26(11):2586-2588. 被引量:16
  • 2Chaum D.Blind Signatures for Untraceable Payments[C] //Proc.of Advances in Cryptology-Crypto'82.Berlin,Germany:[s.n.] ,1982.
  • 3Mambo M,Usuda K,Okamoto E.Proxy Signature:Delegation of the Power to Sign Messages[Z].(1996-08-23).http://ci.nii.ac.jp/ naid/110003216223.
  • 4Jan J K.A Security Personal Learning Tools Using a Proxy Blind Signature Scheme[C] //Proc.of International Conference on Chinese Language Computing.Illinois,USA:[s.n.] ,2000.
  • 5Tan Zuowen,Liu Zhuojun.Digital Proxy Blind Signature Schemes Based on DLP and ECDLP[Z].(2002-12-21).http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.88.2652&rep=rep1&type=pdf.
  • 6Lal S,Awasthi A K.Proxy Blind Signature Scheme[Z].(2003-07-16).http://eprint.iacr.org/2003/072/.
  • 7Shamir A.Identity-based Cryptosystems and Signature Schemes[C] // Proc.of Advances in Cryptology-Crypto'84.[S.l.] :Springer-Verlag,1984.
  • 8Zheng Dong.ID-based Proxy Blind Signature[C] //Proc.of ANNA'04.[S.l.] :IEEE Press,2004.
  • 9Lang W M.A New Efficient ID-based Proxy Blind Signature Scheme[C] //Proc.of ISSC'04.[S.l.] :IEEE Press,2004.
  • 10Zhang Fangguo,Kim K.ID-based Blind Signature and Ring Signature from Pairings[C] //Proc.of the 8th International Conference on the Theory and Application of Cryptology and Information Security.London,UK:[s.n.] ,2002.

共引文献5

同被引文献25

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部