ID-based proxy blind signature scheme

被引:0
|
作者
School of Mathematics and Computer Science, Nanjing Normal University, Nanjing 210097, China [1 ]
不详 [2 ]
机构
来源
Jisuanji Gongcheng | 2006年 / 17卷 / 203-204+224期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
Proxy signature and blind signature are useful tools in cryptography. They both have wide applications in real life. In a proxy signature, an original signer can delegate his signing power to a proxy signer who signs a message on behalf of the original signer. A blind signature has a salient feature that the signer can not make a linkage between the blind signature and the identity of the requester. Based on bilinear paring and an ID-based signature scheme, an ID-based proxy blind signature scheme is presented, which satisfies the security properties of both proxy signature schemes and blind signature schemes. A simple security analysis of the newly proposed scheme is also given.
引用
收藏
相关论文
共 50 条
  • [31] An ID-Based Proxy Multi Signature Scheme without Bilinear Pairings
    Tiwari, Namita
    Padhye, Sahadeo
    SECURITY ASPECTS IN INFORMATION TECHNOLOGY, 2011, 7011 : 83 - 92
  • [32] An efficient ID-based restrictive partially blind signature scheme
    Hu, Xiaoming
    Huang, Shangteng
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 205 - +
  • [33] A Security Enforcement ID-based Partially Blind Signature Scheme
    Tian, Xiu-Xia
    Li, Hong-Jiao
    Xu, Jian-Ping
    Wang, Yong
    WISM: 2009 INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND MINING, PROCEEDINGS, 2009, : 488 - 492
  • [34] ID-based group-oriented proxy signature and blind signature from pairings
    Chen, XF
    Zhang, FG
    CHINESE JOURNAL OF ELECTRONICS, 2006, 15 (01): : 12 - 16
  • [35] An improved ID-based restrictive partially blind signature scheme
    Wang, Shangping
    Han, Pei
    Zhang, Yaling
    Wang, Xiaofeng
    PROCEEDINGS OF NINTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING, 2008, : 295 - 300
  • [36] On the security of an efficient ID-based partially blind signature scheme
    Tseng, Yuh-Min
    Wu, Tsu-Yang
    Wu, Jui-Di
    IMECS 2008: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2008, : 417 - 420
  • [37] An ID-Based Designated-Verifier Proxy Multi-Signature Scheme
    Zuo, Weiping
    Liu, Yunfang
    Wang, Sanfu
    2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 576 - 579
  • [38] An efficient ID-based multi-proxy multi-signature scheme
    Guo, Sheng
    Cao, Zhenfu
    Lu, Rongxing
    FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 81 - +
  • [39] ID-based authenticated blind signature scheme from bilinear pairings
    Zhao, Zemao
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 725 - 728
  • [40] General secure ID-based proxy signature scheme with multi-delegation
    Tian, Xiu-Xia
    Li, Hong-Jiao
    Wen, Mi
    Wang, Yong
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 710 - 714