期刊文献+

基于McEliece公钥密码体制的盲签名算法研究 被引量:1

Blind Signature Scheme Based on McEliece Public Key Cryptosystem
在线阅读 下载PDF
导出
摘要 由于量子计算机对现用公钥密码体制的威胁,抵抗量子计算的公钥密码体制已经成为信息安全领域研究的重点。针对消费者的匿名性保护问题,本文提出一种基于McEliece公钥密码体制的盲签名算法。通过对消息进行Hash,盲化和去盲过程,保证签名的消息与签署行为不可链接,且永远不会被泄露,具有无条件不可追踪性。文章还对这种盲签名的安全性进行分析,分析结果表明,此模型既继承了McEliece公钥密码体制的安全性,能抵抗量子计算机的攻击,也具有一般数字签名和盲签名的基本性质,具有很强的安全性。 Due to the threat of quantum computer on public - key cryptography, the public key cryptosystems against quantum computing has become the focus of research in information security field. A blind sig- nature based on McEliece public key cryptography was proposed aiming at protecting of consumers'anonymi- ty. By Hash on a message and blind process ensure signed message and behavior cannot be linked. At the same time the signature of receiver's identity is kept secret and will never be leaked out, with unconditional intractability and security for this kind of blind signature is analyzed. Result shows that this model has the advantages of inheriting the security of McEliece public-key cryptography, having the general basic proper- ties of digital signatures and blind signatures, resisting quantum computer attack and eventually has a very strong security.
出处 《北京电子科技学院学报》 2012年第2期32-38,共7页 Journal of Beijing Electronic Science And Technology Institute
基金 国家自然科学基金项目(No.61070219) 北京电子科技学院信息安全重点实验室资助课题.
关键词 量子计算 公钥密码体制 McEliece HASH 盲签名 quantum compute public key cryptosystem McEliece Hash blind signature
作者简介 赵程程(1988)女,汉,研究方向:基于编码的公钥密码体制的研究。
  • 相关文献

参考文献4

二级参考文献24

  • 1[1]J Benaloh,M Yung.Distributing the power of a government to enhance the privacy of voters [A].Proc of the 5th ACM of Distributed Computing [C].Calgary ,1986:52-62.
  • 2[2]L Cranor.Electronic voting:Computerized polls may save money,protect privacy [A ].Proc of the Hawaii Internet of Conference on System Science [C].Huawaii,199 7.116-124.
  • 3[3]T Asano,T Matsumoto,H Imai.A study on some schemes for fair election secret voti ng [A].Proc of the 1991 Symposium on Cryptography and Information Security [C ],Japan,1991:SCIS91-12A.
  • 4[4]K Sako.Electronic voting system with objection to the center [A].Proc of the 1 992 Symposium on Cryptography and Information Security [C].1992:SCIS92-13C.
  • 5[5]K R Iverson.A cryptographic scheme for computerized general elections [A].CRYP TO'91 [C].LNCS 576,Berlin:Springer-verlag,1991.405-419.
  • 6[6]D Chaum.Elections with unconditionally-secret ballots and disruption equivalent breaking RSA [A].EUROCYPT'88 [C].LNCS 330,Berlin:Springer-verlag,1988.177- 182.
  • 7[7]K Ohta.An electrical voting scheme using a single administrator [A].1988 Sprin g National Convention Record [C].Berlin:IEICE,1988.A-294.
  • 8[8]D Bonch,M Naor.Timed commitments [A].CRYPTO'00 [C].LNCS1880,Berlin:Springer -Verlag,2000.236-254.
  • 9[9]Fangguo Zhang,Futai Zhang,Yumin Wang.Fair electronic cash systems with multiple banks [A].The sixteenth annual working conference on information security [C ].Beijing:Kluwer,2000.461-470.
  • 10[10]A Fujioka,T Okamoto,K Ohta.A practical secret voting scheme for large scale elec tions [A].AUSCRYPT'92 [C].LNCS 718,Berlin,Springer-verlag,1993:244-251.

共引文献61

同被引文献3

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部