期刊文献+

对两种代理盲签名体制的密码学分析

Cryptanalysis of Two Proxy Blind Signature Schemes
在线阅读 下载PDF
导出
摘要 代理盲签名结合了代理签名与盲签名的优点,而多级代理签名实现了签名权利在许可范围内逐级向下代理的要求。利用椭圆曲线上的双线性对,陈玲玲等人提出了一种基于身份的代理盲签名方案,胡江红等人提出了一种基于身份的多级强代理盲签名方案。给出了这两个方案的密码学分析,指出在陈玲玲等人的方案中,代理签名人可以利用授权证书计算得到原始签名人的私钥,从而可直接伪造原始签名人的签名或授权,同时指出所提的两个方案也无法满足不可追踪性,代理签名人可以将自己在签名协议中的签名和签名的消息联系起来从而跟踪消息的拥有者,从而证明了这两个方案是不安全的。 The proxy blind signature scheme combines the good properties of both proxy signature and blind signature scheme, while the multi-level proxy signature scheme can realize step by step under .agreement. Recently, based on bi- linear pairings of elliptic curve, Chen Lingling proposed an ID-based proxy blind signature scheme, and Hu Jianghong proposed an ID-based multi-level proxy blind signature scheme. Through the cryptanalysis of the two schemes, it shows that in Chen' s scheme, the proxy signer can calculate the original signer' s private key by receiving his authorization, and then he can forge any signature or authorization direcdy. At the same time, the two proposed schemes can not satis- fy the untraceability, the proxy signer can link a signature to the corresponding message of signing protocol so that he can trace the message holder, therefore the two schemes are not secure.
出处 《华东交通大学学报》 2009年第5期75-78,130,共5页 Journal of East China Jiaotong University
基金 福建省自然科学基金项目(2009J01307) 福建省教育厅科技项目(JA09161)
关键词 基于身份 代理盲签名 多级代理 不可追踪性 双线性对 ID-based proxy bind signature multi-level proxy untraceability bilinear pairings
  • 相关文献

参考文献14

  • 1Mambo M, Usdua K, Okamoto E. Proxy signature: delegation of the power to sign messages[ J]. IEICE Transactions on Fundations, 1996, E79 - A(9) : 1 338 - 1 353.
  • 2Zhang F,Safavi-Naini R, Lin C Y.New proxy signature,proxy blind signature and proxy ring signature schemes from bilinear pairing [ EB/OL]. http://eprint, iacr. org,2003 - 10 - 04.
  • 3Chaum D. Bind signature for untraceable payments[ A ]. Chaun D, Rivest R L Swpman A T. Advances in Cryptology: Proceedings of Crypto' 82[ C]. New York: Plemum, 1983.199 - 203.
  • 4Lin W,Jan J K.A security personal learning tools using a proxy bind signature scheme[ A] .Proceedings of International Conference on Chinese Language Computing[ C]. USA: Chinese Language Computer Society Knowledge Systems Institute,2000.273- 277.
  • 5李方伟,谭利平,邱成刚.基于离散对数的代理盲签名[J].电子科技大学学报,2008,37(2):172-174. 被引量:8
  • 6ZHANG Jian-hong, MAO Jian. Linkability analysis of some blind signature schemes[ A]. International Conference on Computational Intelligence and Security 2006[ C ]. Berlin: Springer, 2007. 556 - 566.
  • 7Sherman S M Chow. Blind signature and ring signature schemes: Rehabilitation and attack[ J]. Computer Standards and Interfaces, 2008, 31(4) :707 - 712.
  • 8陈玲玲,亢保元,张磊.一种高效的基于身份的代理盲签名方案[J].华东交通大学学报,2008,25(1):113-116. 被引量:8
  • 9胡江红,张建中.新的基于双线性对的多级强代理盲签名方案[J].计算机工程与应用,2007,43(18):123-125. 被引量:11
  • 10黄辉,秦静,李丽.一个改进的代理盲签名方案[J].计算机应用,2007,27(6):1539-1541. 被引量:6

二级参考文献39

共引文献43

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部