期刊文献+

基于身份的代理盲签名方案的分析与改进 被引量:9

Analysis and Improvement of ID-based Proxy Blind Signature
在线阅读 下载PDF
导出
摘要 针对一些基于身份的代理盲签名不具有不可追踪性的问题,根据双线性对附加参数的随机特性,提出一种改进的基于身份的代理盲签名方案,采用密码学安全性分析方法,提高系统的安全性和效率。仿真实验结果表明,该改进方案克服了现有方案的安全隐患,并且能够保留已有方案的其他优点,具有一定实用价值。 Aiming at the unlinkability problem of some existed ID-based proxy blind signatures, according to bilinear pairings and random property of extra parameter, a new efficient ID-hased proxy blind signature is proposed. Security analysis in cryptography is carried out to analyze the scheme. The system security and efficiency are promoted. Simulation experimental results show this scheme not only mends the security leak but also retains the merits of the existed blind signature schemes. It has the application value.
作者 张学军
出处 《计算机工程》 CAS CSCD 北大核心 2009年第23期122-123,126,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60573043)
关键词 代理盲签名 不可追踪性 基于身份 双线性对 proxy blind signature unlinkability ID-based bilinear pairings
作者简介 张学军(1968-),男,教授、博士,主研方向:密码学及应用 E-mail:xjzhang99@163.com
  • 相关文献

参考文献4

二级参考文献16

  • 1李素娟,张福泰.基于ID的代理盲签名[J].计算机工程,2006,32(17):203-204. 被引量:8
  • 2Chaum D.Blind Signature Systems[C].Proceedings of the Crypto'83.New York:Springer-Verlag,1998:153-156.
  • 3Mambo M,Usuda K,Okamoto E.Proxy Signatures for Delegating Signing Operation[C].Proceedings of the 3rd ACM Conference on Computer and Communications Security.New Delhi:ACM Press,1996:48-57.
  • 4Hess F.Esponent Group Signature Schemes and Efficient Identity Based Signature Schemes Based on Pairing[Z].http://eprint.iacr.org/2002.
  • 5MAMBO M, USUDA K, OKAMOTO E. Proxy signatures: delegation of the power to sign messages[ J]. IEICE Transactions on Fundamentals, 1996, E79-2A(9): 1338 - 1353.
  • 6LIN W D, JAN J K. A security personal learning tools using a proxy blind signature scheme[ C]// Proceedings of International Conference on Chinese Language Computing. Washington: IEEE Computer Society, 2000:273 - 277.
  • 7AWASTHI A K, LAL S. Proxy blind signature scheme[J]. JFCR Transaction on Cryptology, 2005, 2(1) : 5 - 11.
  • 8SUN H M, HSIEH B T, On the security of some proxy blind signature schemes[ EB/OL]. [ 2007 - 08 - 20]. http://eprint. iacr. org,
  • 9SHAMIR A . Identity - based cryptosystems and signature schemes [ EB/OL]. [ 2007 - 08 - 151. http://www.iseca, org/downloads/ Shamir47. pdf.
  • 10ZHENG DONG, HUANG ZHENG, CHEN KE - FEI. ID - based proxy blind signature[ C]// 18th International Conference on Advanced Information Networking and Applications. [ s. l. ] : IEEE, 2004:380 - 383.

共引文献18

同被引文献79

引证文献9

二级引证文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部