ID-based proxy blind signature scheme

被引:0
|
作者
School of Mathematics and Computer Science, Nanjing Normal University, Nanjing 210097, China [1 ]
不详 [2 ]
机构
来源
Jisuanji Gongcheng | 2006年 / 17卷 / 203-204+224期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
Proxy signature and blind signature are useful tools in cryptography. They both have wide applications in real life. In a proxy signature, an original signer can delegate his signing power to a proxy signer who signs a message on behalf of the original signer. A blind signature has a salient feature that the signer can not make a linkage between the blind signature and the identity of the requester. Based on bilinear paring and an ID-based signature scheme, an ID-based proxy blind signature scheme is presented, which satisfies the security properties of both proxy signature schemes and blind signature schemes. A simple security analysis of the newly proposed scheme is also given.
引用
收藏
相关论文
共 50 条
  • [41] A Modified ID-Based Proxy Signature Scheme without Key Generation Center
    Liu Er-gen
    Zhou Hua-jing
    Zuo Li-ming
    Wang Xia
    Zhou Hua-jing
    ELECTRICAL AND CONTROL ENGINEERING & MATERIALS SCIENCE AND MANUFACTURING, 2016, : 276 - 281
  • [42] An Efficient Provable Secure ID-Based Proxy Signature Scheme Based on CDH Assumption
    柴震川
    曹珍富
    陆荣幸
    Journal of Shanghai Jiaotong University(Science), 2006, (03) : 271 - 278
  • [43] A Provably Secure ID-based Designated Verifier Proxy Signature Scheme Based on DLP
    Wei, Baodian
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4, 2013, 411-414 : 721 - 724
  • [44] An Efficient ID based Proxy Signature, Proxy Blind Signature and Proxy Partial Blind Signature
    Majhi, Banshidhar
    Sahu, Deepak Kumar
    Subudhi, RamNarayan
    ICIT 2008: PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, 2008, : 19 - 23
  • [45] ID-Based Aggregate Proxy Signature Scheme Realizing Warrant-Based Delegation
    Lin, Yen-Ching
    Wu, Tzong-Chen
    Tsai, Jia-Lun
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2013, 29 (03) : 441 - 457
  • [46] Provable security of ID-based proxy signature schemes
    Gu, CX
    Zhu, YF
    NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 1277 - 1286
  • [47] Improvement of ID-based proxy re-signature scheme with pairing-free
    Zhang, Jianhong
    WIRELESS NETWORKS, 2019, 25 (07) : 4319 - 4329
  • [48] Efficient ID-based proxy multi-signature scheme secure in random oracle
    Sahu, Rajeev Anand
    Padhye, Sahadeo
    FRONTIERS OF COMPUTER SCIENCE, 2012, 6 (04) : 421 - 428
  • [49] ID-based proxy signature using bilinear pairings
    Xu, J
    Zhang, ZF
    Feng, DG
    PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS - ISPA 2005 WORKSHOPS, 2005, 3759 : 359 - 367
  • [50] Improvement of ID-based proxy re-signature scheme with pairing-free
    Jianhong Zhang
    Wireless Networks, 2019, 25 : 4319 - 4329