ID-based proxy blind signature scheme

被引:0
|
作者
School of Mathematics and Computer Science, Nanjing Normal University, Nanjing 210097, China [1 ]
不详 [2 ]
机构
来源
Jisuanji Gongcheng | 2006年 / 17卷 / 203-204+224期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
Proxy signature and blind signature are useful tools in cryptography. They both have wide applications in real life. In a proxy signature, an original signer can delegate his signing power to a proxy signer who signs a message on behalf of the original signer. A blind signature has a salient feature that the signer can not make a linkage between the blind signature and the identity of the requester. Based on bilinear paring and an ID-based signature scheme, an ID-based proxy blind signature scheme is presented, which satisfies the security properties of both proxy signature schemes and blind signature schemes. A simple security analysis of the newly proposed scheme is also given.
引用
收藏
相关论文
共 50 条
  • [1] Efficient ID-Based Proxy Blind Signature Scheme
    ZHANG Qing1
    2. School of Computer
    WuhanUniversityJournalofNaturalSciences, 2007, (01) : 105 - 108
  • [2] A New ID-Based Proxy Blind Signature Scheme
    LANG Wei-min~1
    2. People’s Liberation Army Institute of Communications Command
    WuhanUniversityJournalofNaturalSciences, 2005, (03) : 555 - 558
  • [3] New ID-based proxy blind signature scheme
    Lang, Wei-Min
    Yang, Zong-Kai
    Cheng, Wen-Qing
    Tan, Yun-Meng
    Wuhan University Journal of Natural Sciences, 2005, 10 (03) : 555 - 558
  • [4] A NEW EFFICIENT ID-BASED PROXY BLIND SIGNATURE SCHEME
    Ming Yang Wang Yumin (State Key Lab of Integrated Service Network
    JournalofElectronics(China), 2008, (02) : 226 - 231
  • [5] ID-based proxy blind signature
    Dong, Z
    Zheng, H
    Chen, KF
    Kou, WD
    18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, : 380 - 383
  • [6] PROXY BLIND SIGNATURE SCHEME FOR ID-BASED DESIGNATED VERIFIER
    Zhang, Xiaozhi
    Xi, Junfu
    Wang, Zhengqiang
    2011 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATIONS AND CONTROL (ICECC), 2011, : 376 - 379
  • [7] A new efficient ID-based proxy blind signature scheme
    Lang, WM
    Tan, YM
    Yang, ZK
    Liu, G
    Peng, B
    ISCC2004: NINTH INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2004, : 407 - 411
  • [8] A NEW ID-BASED PROXY BLIND SIGNATURE SCHEME WITH MESSAGE RECOVERY
    Kong, Tingting
    Xu, Qiuliang
    Wong, Zhiqiang
    3RD INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE (IEEC 2011), PROCEEDINGS, 2011, : 162 - 165
  • [9] A short ID-based proxy signature scheme
    Asaar, Maryam Rajabzadeh
    Salmasizadeh, Mahmoud
    Susilo, Willy
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (05) : 859 - 873
  • [10] ID-based, Proxy, Threshold Signature Scheme
    Pomykala, Jacek
    Kulakowski, Henryk
    Sapiecha, Piotr
    Grela, Blazej
    INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2021, 67 (02) : 201 - 205