期刊文献+

一种新型的代理盲签名方案 被引量:17

A New Proxy Blind Signature Scheme
在线阅读 下载PDF
导出
摘要 提出了一种新型的代理盲签名方案,它解决Tan等人提出的代理盲签名方案(谭方案)中存在的2个问题:①伪造性.原始签名者或签名接受者能伪造任何文件的代理盲签名.②追踪性.代理者能够把生成代理盲签名的行为与去盲后得到的真实文件签名关联起来.因此,新方案具有更高的安全性. A new proxy blind signature scheme is proposed to resolve two issues in the Tan's proxy blind signature scheme: ① Forgeability. Both original signer and signature receiver can forge a valid proxy blind signature for any file. ② Traceability. The proxy signer can relate the formation process of the proxy blind signature to the unblind signature for the file. Therefore, the new scheme is of more security.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2006年第3期48-52,共5页 Journal of Beijing University of Posts and Telecommunications
关键词 代理签名 盲签名 代理盲签名 proxy signature blind signature proxy blind signature
  • 相关文献

参考文献11

二级参考文献36

  • 1周智,胡正名.用户验证方案设计[J].北京邮电大学学报,1996,19(1):86-90. 被引量:2
  • 2祁明.数字签名及其在信息安全协议中的应用:博士论文[M].西安:西安电子科技大学,1996..
  • 3Stinson DR. Crvotoaraohv Theory and Practice. 2nd ed., New York: CRC Press, 2002. 282-285.
  • 4Tan ZW, Liu ZJ. Tang CM. Digital proxy blind signature schemes based on DLP and ECDLP. Vol.21, Beijing: Key Laboratory of Mathematics Mechanization Research, Academy of Mathematics and Systems Science, the Chinese of Academy of Sciences, 2002. 212-217.
  • 5Chaum D. Blind signature systems. In: Chaum D, ed. Proceedings of the Crypto'83. New York: Springer-Vedag, 1998. 153-156.
  • 6Chaum D, Fiat A, Naor M. Untraceable electronic cash. In: Goldwasser S, ed. Proceedings of the Crypto'88. LNCS 403, New York: Springer-Vedag, 1990. 319-327.
  • 7Chaum D, Boen B, Heyst E, Mjolsnes S, Steenbeek A. Efficient off-line electronic check. In: Quisquater J. Vandewalle J, eds. Proceedings of the Eurocrypt'89. LNCS 434, Berlin: Springer-Verlag, 1990. 294-301.
  • 8Brands S. Untraceable off-line cash in wallets with observers. In: Douglas RS, ed. Proceexlings of the Crypto'93. LNCS 773, New York: Springer-Verlag, 1994. 302-318.
  • 9Mambo M, Usuda K,Okamoto E. Proxy signatures for delegating signing operation. In: Proceedings of the 3rd ACM Conference on Computer and communications Security. New Delhi: ACM Press, 1996.48-57.
  • 10Lee B, Kim H, Kim K. Strong proxy signature and its applications. In: Proceedings of the 2001 Symposium on Cryptography and Information Security (SCIS 2001). 2001.

共引文献144

同被引文献140

引证文献17

二级引证文献36

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部