期刊文献+

一种门限代理盲签名方案 被引量:4

Scheme of threshold proxy blind signature
在线阅读 下载PDF
导出
摘要 以电子选举为例,在盲签名的基础上将双线性对作为工具,结合代理签名和门限签名,提出了基于双线性对的门限代理盲签名方案。详细分析了方案的实现过程,并对该方案的有效性、安全性、盲性和方案效率进行分析论证。通过分析及论证,得出该方案的实现过程简单,效率较高。 Example of an electronic election,the paper presents threshold proxy blind signature scheme using bilinear pairings based on the blind signature.This scheme combined proxy signature and threshold signature.The paper analyses the process of scheme and effectiveness,safety,blind,efficiency of the scheme in detail.By analyzing and proofing,we conclude that this scheme has feature of easier process and better efficiency.
出处 《现代电子技术》 2012年第9期70-72,共3页 Modern Electronics Technique
基金 陕西省教育厅专项科研计划项目(09JK572)
关键词 电子选举 双线性对 门限签名 代理签名 盲签名 E-voting bilinear pairing threshold signature proxy signature blind signature
  • 相关文献

参考文献3

二级参考文献28

共引文献6

同被引文献28

  • 1Cheng Xiangguo Xu Weidong Wang Xinmei.A THRESHOLD BLIND SIGNATURE FROM WEIL PAIRING ON ELLIPTIC CURVES[J].Journal of Electronics(China),2006,23(1):76-80. 被引量:6
  • 2陈开兵.基于门限多重盲签名的电子选举方案[J].科学技术与工程,2007,7(12):2856-2859. 被引量:2
  • 3AL-RIYAMI S S, PATERSON K G. Certificateless public key cryptography[ C] // Advance in Cryptography Asiacrypt 2003, LNCS 2894. Berlin: Springer-Verlag, 2003:452 -473.
  • 4CHAUM D. Blind signatures for untraceable pryment[ C]// Crypto' 82: Advances in Cryptology. Berlin: Springer, 1952:199 -203.
  • 5MAMBO M, USUDA K, OKAMOTO E. Proxy signature: Delegation of the power to sign messages[ J]. IEICE Transactions on Fundamentals, 1996, E792A (9): 1338- 1353.
  • 6LEE W B, CANG C Y. Efficient proxy signatures scheme based on discrete logarithm[ C]// Proceedings of 10 th Conference on Information Security. Washington, DC: IEEE Computer Society, 2000:4-7.
  • 7AMIT K A, SUNDER L. Proxy blind signature scheme[ EB/OL]. [ 2012 - 04 - 15]. http://eprint. iaer. org/2003/72.
  • 8HUB C, WONG D S, ZHANG ZHENFENG, et al. Certifieateless signature: A new security model and an improved generic construction [J]. Designs, Codes and Cryptography, 2007, 42(2) : 109 - 126.
  • 9ZHANG ZHENFENG, WONG D S, XU JING, et al. Certificateless public-key signature: security model and efficient construction [ C]// Proceedings of Applied Cryptography and Network Security, LNCS 3989. Berlin: Springer-Verlag, 2006:293 - 308.
  • 10DESMEDT Y, FRANKEL Y. Shared generation of authenticators and signatures[ C]// Advances in Cryptology, LNCS 576. Berlin: Springer-Verlag, 1991:457 -469.

引证文献4

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部