期刊文献+

部分盲签名综述 被引量:3

Survey of partially blind signature
在线阅读 下载PDF
导出
摘要 首先叙述了部分盲签名在传统公钥密码体制下的研究现状,并介绍了一个有代表性的部分盲签名方案;然后叙述了部分盲签名在基于身份的密码体制下的研究进展,同时介绍了一个典型的基于身份的部分盲签名方案;随后叙述了部分盲签名在无证书公钥密码体制下的研究现状,介绍了一个有代表性的无证书部分盲签名方案;最后说明了部分盲签名目前存在的问题,并指出了下一步的研究方向。 At first,this paper described the research situation of partially blind signature under the traditional public key cryptography,and introduced a representative of the partially blind signature schemes.Then it discussed the progresses of partially blind signature under the identity-based cryptography,and introduced a typical identity-based partially blind signature scheme.Then it described the advances of partially blind signature under the certificateless public key cryptography,and introduced a representative certificateless partially blind signature scheme.Finally,it illustrated the existing problems of partially blind signature,and pointed out the future research directions.
出处 《计算机应用研究》 CSCD 北大核心 2012年第12期4437-4440,共4页 Application Research of Computers
基金 国家"973"重点基础研究发展规划基金资助项目(2011CB311809) 国家自然科学基金面上项目(61163050)
关键词 部分盲签名 基于身份 无证书 双线性对 partially blind signature identity-based certificateless bilinear pairings
  • 相关文献

参考文献31

  • 1CHAUM D. Blind signatures for untraceable payments [ C ]//Proc of CRYPTO 1982. New York: Plenum Press, 1983 : 199-203.
  • 2ABE M, FUJISAKI E. How to date blind signatures [ C ]//Proc of ASIACRYPT 1996. Berlin : Springer-Verlag, 1996 : 244 - 251.
  • 3DIFFIE W, HELLMAN M E. New directions in cryptography [ J ]. IEEE Trans on Information Theory, 1976,22 (6) : 644-654.
  • 4ABE M, OKAMOTO T. Provably secure partially blind signatures [C]//Proc of CRYPTO 2000. Berlin: Springer-Verlag, 2000: 271-286.
  • 5JUELS A, LUBY M, OSTROVSKY R. Security of blind digital signatures[ C ]//Proc of CRYPTO 1997. Berlin: Springer-Verlag, 1997 : 150-164.
  • 6WU Qian-hong, SUSILO W, MU Yi, et al. Efficient partially blind signatures with provable security [ C ]//Proc of International Conference on Computational Science and its Applications. Berlin: Springer-Verlag,2007 : 1096-1105.
  • 7CAO Tian-jie, LIN Dong-dai, XUI Rui. A randomized RSA-based partially blind signature scheme for electronic cash[ J]. Computers and Security,2005,24( 1 ) : 44-49.
  • 8MARTINET G, POUPARD G, SOLA P. Cryptanalysis of a partially blind signature scheme or how to make $100 bills with" $1 and $2 ones[C]//Proc of Financial Cryptography and Data Security. Berlin: Springer-Verlag,2006 : 171-176.
  • 9HUANG Hui-feng, CHANG C C. A new design of efficient partially blind signature scheme [ J ]. Journal of Systems and Software, 2004,73 ( 3 ) :397-403.
  • 10ZHANG Fang-guo, CHEN Xiao-feng. Cryptanalysis of Huang-Chang partially blind signature scheme[J]. Journal of Systems and Soft-ware,2005,76(3) :323-325.

二级参考文献86

共引文献109

同被引文献25

  • 1张学军,王育民.高效的基于身份的部分盲签名[J].计算机工程与应用,2007,43(11):211-212. 被引量:11
  • 2SHAMIR A.Identity-based cryptosystems and signature schemes[C]//Proc of CRYPTO,84.Berlin:Springer,1984:47-53.
  • 3GENTRY C.Certificate-based encryption and the certificate revoca-tion problem[C]//Lecture Notes in Computer Science,vol 2656.Berlin:Springer-Verlag,2003:272-293.
  • 4KANG B G,PARK J H,HAHN S G.A certificate-based signaturescheme[C]//Lecture Notes in Computer Science,vol 2964.Berlin:Springer-Verlag,2004:99-111.
  • 5WU Wei,MU Yi,SUSILO W,et al.Certificate-based signatures re-visited[J].Journal of Universal Computer Science,2009,15(8):1659-1684.
  • 6CHAUM D.Blind signature for untraceable payments[C]//Proc ofAdvances in Cryptology-CRYPTO.Berlin ; Plenum Press,1983:199-233.
  • 7刘亚丽,殷新春,陈决伟.基于ELGAMAL前向安全的盲签名方案[J].通信学报,2007,28(8A):48-53.
  • 8ABE M,FUJISAKI E.How to date blind signatures[C]//Proc ofInternational Conference on Theory and Applications of Cryptology andInformation Security.Berlin:Springer-Verlag,1996:244-251.
  • 9CHOW S S M,HUI L C K1YIU S M.Two improved partially blindsignature schemes from bilinear pairings[C]//Proc of the 10th Aus-tralasian Conference on Information Security and Privacy.Berlin:Springer-Verlag,2005:316-328.
  • 10SHIM K A.An ID-based aggregated signature scheme with constantpairing computation[J]. Journal of Systems and Software,2010,83(10):1873-1880.

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部