期刊文献+

无证书多重代理多重盲签名方案 被引量:1

Certificateless Multi-proxy Blind Multi-signature Scheme
在线阅读 下载PDF
导出
摘要 为了提高盲签名的安全性和实用性,结合无证书公钥密码体制、多重代理多重签名和盲签名,首次提出了一个无证书多重代理多重盲签名方案。在该方案中,需要所有的原始签名者合作才能完成代理授权,同时只有所有的代理签名者合作才能产生多重代理多重盲签名。该方案解决了多个代理签名者代表多个原始签名者进行盲签名的问题。经分析得知,方案同时具有多重代理多重签名和盲签名所需的安全特性。 In order to improve the security and practicality of blind signature,this paper introduces a certificateless multi-proxy blind multisignature scheme by adopting certificateless cryptography,multi-proxy multi-signature and blind signature.In this scheme,the original signers can cooperatively finish proxy-delegatation process,and the proxy signers can cooperatively generate multi-proxy blind multi-signature.The scheme solves how to generate blind signature while multiple proxy signers sign the message on behalf of multiple original signers.By analyzing the scheme,it is concluded that the scheme has the security properties which multi-proxy multi-signature and blind signature need.
机构地区 南昌陆军学院
出处 《计算机安全》 2010年第10期6-8,共3页 Network & Computer Security
关键词 数字签名 无证书密码系统 多重代理多重签名 盲签名 digital signature certificateless cryptography multi-proxy multi-signature blind signature
  • 相关文献

参考文献6

二级参考文献30

  • 1Mambo M, Usuda K, Okamoto E. Proxy signature: Delegation of the power to sign messages. IEICE Trans. on Fundamentals, 1996, E79-A(9): 1338-1353.
  • 2Zhang k Threshold proxy signature schemes. In: Proc. of the 1997 Information Security Workshop. Japan, 1997. 191-197.
  • 3Yi LJ, Bai GQ, Xiao GZ. Proxy multi-signature scheme: A new type of proxy signature scheme. Electronics Letters, 2000,36(6): 527-528.
  • 4Huang XY, Mu Y, Susilo W, Zhang FT. Short designated verifier proxy signature from pairings. In: Proc. of the SecUbiq 2005. LNCS3823, Nagasaki, Springer-Verlag, 2005. 835-844.
  • 5Zhang FG, Kim-K. Efficient 1D-based-blind signature and proxy signature from bilinear pairings. In: Safavi-Naini R, Seberry J, eds. Proc. of the ACISP 2003. LNCS 2727, Springer-Verlag, 2003. 312-323.
  • 6Al-Riyami S, Paterson K. Certificateless public key cryptography. In: Prec. of the Asiacrypt 2003. LNCS 2894, Springer-Verlag, 2003. 452-473.
  • 7Huang XY, Mu Y, Susilo W, Wong DS, Wu W. Certificateless signature revisited. In: Proc. of the Acisp 2007. LNCS 4586, Springer-Verlag, 2007. 308-322.
  • 8Zhang ZF, Wong DS, Xu J, Feng DG. Certificateless public-key signature: Security model and efficient construction. In: Zhou J, Yung M, Bao F, eds. Proc. of the ACNS 2006. LNCS 3989, Springer-Verlag, 2006. 293-308.
  • 9Li X, Chen K, Sun L. Certificateless signature and proxy signature schemes from bilinear pairings. Lithuanian Mathematical Journal, 2005,45(1 ):76-83.
  • 10Lu R, He D, Wang CJ. Cryptanalysis and improvement of a certificateless proxy signature scheme from bilinear pairings. In: Proe. of the 8th ACIS Int'l Conf. on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing. 2007. 285-290. doi: 10.1109/SNPD.

共引文献31

同被引文献10

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部