期刊文献+

基于丛同态的部分盲签名方案

Partial blind-signature scheme based on bundling homomorphism
原文传递
导出
摘要 为满足电子世界一种特殊的签名需要,利用丛同态理论设计了一种部分盲签名方案。利用归约方法证明具有多项式计算能力的攻击者无法伪造一个可以通过验证的部分盲签名。也不能签署一个消息,随后又成功地否认签署过这个消息。具有无穷计算能力的攻击者,虽然能够成功伪造一个可通过验证的签名,但是伪造的签名很容易被发现。这样的部分盲签名方案同时保护了签名人的利益和签名依赖人的隐私信息。 This paper describes a partial blind signature scheme based on the theory of bundling homomorphism. Analysis of the scheme shows by induction that an adversary with polynomial computing ability can neither forge a partial blind signature that can be verified nor sign a message but successfully deny signing it later. An adversary with infinite computing ability can forge a partial blind signature that can be verified, but it can be easily found. Therefore, this scheme can guarantee the benefits of both signer and nominee, and the privacy of the nominee.
出处 《清华大学学报(自然科学版)》 EI CAS CSCD 北大核心 2006年第7期1321-1324,共4页 Journal of Tsinghua University(Science and Technology)
基金 国家"八六三"高技术项目(2005AA114160)
关键词 部分盲签名 验证 丛同态 离散对数 因子分解 partial blind signature verification bundling homomorphism discrete logarithm factoring
  • 相关文献

参考文献7

  • 1Goldreich O.Foundations of cryptography-Volume II[M].London:Cambridge University Press,2004.
  • 2Susilo W,Safavi R,Gysin M,et al.A new and efficient fail-stop signature scheme[J].The Computer Journal,2000,43(5):430-437.
  • 3Pedersen T.P,Pfitzman B.Fail-stop signature[J].SIAM Journal of Computing,1997,26(2):291-330.
  • 4Chaum D.Zero-knowledge Undeniable Signature:Lecture Note in Computer Science 473[M].New York:Springer-Verlag,1990.
  • 5李顺东,戴一奇.一种新的并行多消息签名方案[J].通信学报,2003,24(10):153-158. 被引量:2
  • 6Abe M,Fujisaki E.How to Make Blind Signatures:Lecture Note in Computer Science 1163[M].New York:Springer-Verlag,1996.
  • 7钟鸣,杨义先.一种基于比特承诺的部分盲签名方案[J].通信学报,2001,22(9):1-6. 被引量:17

二级参考文献14

  • 1Schneier Bruce 吴世忠译.应用密码学[M].北京:机械工业出版社,2000..
  • 2RIVEST R L, SHAMIR A, ADLEMAN L. A method for obtaining digital signatures and public cryptosystems[J]. Comm Assoc Comput, 1983, 26(3):96-99.
  • 3FIPS 186-2 (2001), National Institute of Standard and Technology[S].
  • 4Government Committee of the Russia for Standard. GOST R34.10-94,Gosudarstvennyi Standard of Russian Federation, Information Technology. Cryptographic Data Security Produce and Check Procedures of Electronic Digital Signature Based on Asymmetric Cryptographic Algorithm[S].
  • 5CHAUM D. Zero-knowledge undeniable signatures[A]. Proceedings of Advances in Cryptology EUROCRYPT'90[C].Spinger-Verlag, 1991. 458-464.
  • 6CHAUM D. Designated confirmer signature[A]. Proceedings of Advances in Cryptology -EUROCRYPT'94[C]. Spinger-Verlag,1994,.
  • 7KIM S, PARK S, WON D. Zero-knowledge nominative signatures[A]. Proc of Pragocrypf96, International Conference on the Theory and Applications of Cryptology[C]. Czech, Prague, 1996. 380-392.
  • 8PEDERSEN T P, PFITZMAN B. Fail-stop signature[J]. SIAM J COMPUT, 1997, 26 (2): 291-330.
  • 9SUSILO W, SAFAVI R, GYSIN M, et al. A new and efficient fail-stop signature scheme[J]. The Computer Journal, 2000, 43 (5):430-437.
  • 10KIM S, PARK S, won D. Proxy signatures, revisited[A]. Proc of ICICS'97, International Conference on Information and Communications Security [C]. Springer-Verlag, LNCS 1334, 1997. 223-232.

共引文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部