期刊文献+

一种新的基于身份的代理盲签名方案 被引量:7

New ID-based Proxy Blind Signature Scheme from Bilinear Pairings
在线阅读 下载PDF
导出
摘要 利用双线性映射理论,结合代理签名和盲签名的优点,在基于身份的公钥密码体制中,提出了一种基于身份的代理盲签名方案。该方案采用以身份为基础的公钥,取代了以数字证书为基础的公钥,省略了验证签名时从系统中获取公钥的步骤,减少了交互的次数,节省了存储空间,并克服了李方案中存在的两个安全性缺陷,有效防止了原始签名人冒充代理签名人对消息进行签名,且限制了代理签名人的代理签名权。 Based on theory of well paring and ID-based cryptography system, a new ID-based proxy blind signature is presented, which satisfies the security properties of both proxy signature scheme and blind signature scheme. The scheme which uses ID-based public key to replace the digital certification public key could effectively omit the process of getting public key from the system and reduce the interaction times and the memory space. Thus, it resolves two issues in Li's proxy blind signature scheme, which could effectively prevent original signer from forging a valid proxy blind signature for any file and restrict the virtual proxy power of proxy signatory.
作者 蔡光兴 陈华
出处 《计算机工程》 CAS CSCD 北大核心 2007年第9期145-147,150,共4页 Computer Engineering
关键词 代理签名 盲签名 基于身份 双线性映射 WEIL对 Proxy signature Blind signature Identity-based Bilinear map Weil paring
  • 相关文献

参考文献3

二级参考文献14

  • 1A Shamir. Identity-Based Cryptosystems and Signature Schemes[C]. In: Proc Crypto 1984, LNCS, Springer-verlag,1985, 196:47-53.
  • 2http://venona.antioffine.com.
  • 3D Boneh, M Franklin. Identity-Based Encryption from the Well pairing [C]. In: Proc Crypto 2001, LNCS, Springer-Verlag, 2001, (2139): 213-229.
  • 4F Hess. Efficient Identity Based Signature Schemes Based on Pairings, SAC 2002, LNCS Springer-Verlag, 2002,(2595): 310-320.
  • 5WenboMao.Modern Cryptography:Theory and Practice[M].电子工业出版社,2004.7.
  • 6Chaum D. Blind Signatures for Untraceable Payments[A]. Advances in Cryptology Crypto ' 82, LNCS[C], 1982: 199-203
  • 7Brands S. Untraceable Off-line Cash in Wallets with Observers[A]. Proceedings of Crypto'93[C], LNCS, 773, Springer-Verlag,1993:302-318
  • 8Mambo M, Usuda K, Okamoto E. Proxy Signatures for Delegating Signing Operation[A].In: Proc. of 3rd ACM Conference on Computer and Communication Security[C], 1996: 48-57
  • 9Tan Z, Liu Z, Tang C. Digital Proxy Blind Signature Schemes Based on DLP and ECDLP[A].MM Research Preprints[C], Beijing, MMRC, AMSS, Academia, Sinica, 2002-12: 212-217
  • 10Lal S, Awasthi A K. Proxy Blind Signature Scheme [EB/OL]. http://eprint.iacr.org/2003/072.pdf, 2003

共引文献31

同被引文献52

引证文献7

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部