期刊文献+

RING PROXY SIGNATURES 被引量:1

RING PROXY SIGNATURES
在线阅读 下载PDF
导出
摘要 Proxy signatures have been used to enable the transfer of digital signing power within some context and ring signatures can be used to provide the anonymity of a signer. By combining the functionalities of proxy signatures and ring signatures, this paper introduces a new concept, named ring proxy signature, which is a proxy signature generated by an anonymous member from a set of potential signers. The paper also constructs the first concrete ring proxy signature scheme based on the provably secure Schnorr's signatures and two ID-based ring proxy signature schemes. The security analysis is provided as well. Proxy signatures have been used to enable the transfer of digital signing power within some context and ring signatures can be used to provide the anonymity of a signer. By combining the functionalities of proxy signatures and ring signatures, this paper introduces a new concept, named ring proxy signature, which is a proxy signature generated by an anonymous member from a set of potential signers. The paper also constructs the first concrete ring proxy signature scheme based on the provably secure Schnorr's signatures and two ID-based ring proxy signature schemes. The security analysis is provided as well.
出处 《Journal of Electronics(China)》 2008年第1期108-114,共7页 电子科学学刊(英文版)
基金 Supported by the National Natural Science Foundation of China (No. 60403007, No. 60503006, No. 60572059) the Natural Science Foundation of Guangdong Province, China (No.05300706).
关键词 Proxy signature Ring signature Ring proxy signature ID-based cryptography Bilinear parings 代理签名 可撤消环 技术性能 ID
  • 相关文献

参考文献10

  • 1M. Mambo,K. Usuda,and E. Okamoto.Proxy sig- natures for delegating signing operation[].The rd ACM Conference on Computer and Communications Security.1996
  • 2S. Kim,S. Park,and D. Won.Proxy signatures, re- visited[].The First International Conference on In- formation and Communication Security.1997
  • 3B. Lee,H. Kim,and K. Kim.Strong proxy signature and its applications[].The Symposium on Cryp- tography and Information Security.2001
  • 4S. J. Hwang,and C. H. Shi.A simple multi-proxy signature scheme[].The th National Conference on Information Security.2000
  • 5K. Zhang.Threshold proxy signature schemes[].The First International Information Security Workshop.1997
  • 6S. Lal,and A. K. Awasthi.Proxy blind signature scheme[].Http://eprintiacrorg /.2003
  • 7F. Zhang,R. Safavi-Naini,and C. Y. Lin.New proxy signature, proxy blind signature and proxy ring sig- nature schemes from bilinear pairings[].Http://eprint iacrorg///.2003
  • 8K. Shum,and V. K. Wei.A strong proxy signature scheme with proxy signer privacy protection[].The th IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative En- terprises.2002
  • 9H. M. Sun,and B. T. Hsieh.Cryptanalysis of a strong proxy signature scheme with proxy signer privacy protection[].The th Annual International Carnahan Conference on Security Technology.2003
  • 10K. Awasthi,and S. Lal.ID-based ring signature and proxy ring signature schemes from bilinear pairings. http://eprint. iacr.org/2004/184 . 2004

同被引文献2

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部