首页 | 本学科首页   官方微博 | 高级检索  
     

新的无证书的门限代理盲签名方案
引用本文:王珍,刘培玉,李凤银. 新的无证书的门限代理盲签名方案[J]. 计算机应用, 2012, 32(11): 3140-3142. DOI: 10.3724/SP.J.1087.2012.03140
作者姓名:王珍  刘培玉  李凤银
作者单位:1. 山东省分布式计算机软件新技术重点实验室,济南 2500142. 山东师范大学 信息科学与工程学院,济南 2500143. 山东师范大学 信息科学与工程学院,济南2500144. 山东师范大学 山东省分布式计算机软件新技术重点实验室,济南250014
基金项目:国家自然科学基金资助项目(60873247);国家社会科学基金资助项目(12BXW040);山东省自然科学基金资助项目(ZR2009GZ007,ZR2011FM030)
摘    要:代理盲签名兼具代理签名和盲签名的优点,同时其具备可扩展性,得到了广泛的关注和研究。针对普通代理盲签名方案中存在代理者权限过大的问题,新方案引入了基于秘密分享思想的门限签名技术,构造了一种新的无证书的门限代理盲签名方案。详细分析了方案的实现过程,分析表明,该方案易于实现,并且能在随机预言下证明其安全性。新方案能够很好的应用在电子投票、电子政务等要求代理签名且需要保护隐私的场合。

关 键 词:双线性对  无证书密码体制  门限  代理盲签名  随机预言机  
收稿时间:2012-05-18
修稿时间:2012-06-29

New certificateless threshold proxy blind signature scheme
WANG Zhen,LIU Pei-yu,LI Feng-yin. New certificateless threshold proxy blind signature scheme[J]. Journal of Computer Applications, 2012, 32(11): 3140-3142. DOI: 10.3724/SP.J.1087.2012.03140
Authors:WANG Zhen  LIU Pei-yu  LI Feng-yin
Affiliation:1. School of Information Science and Engineering,Shandong Normal University,Jinan Shandong 250014,China2. Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology,Jinan Shandong 250014,China3. School of Information Science and Engineering, Shandong Normal University, Jinan Shandong 250014, China4. Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology, Shandong Normal University, Jinan Shandong 250014, China
Abstract:Proxy blind signatures with extended properties are being thought highly of and widely researched in recent years, because they have both the features of proxy signatures and blind signatures. In traditional proxy blind signature, proxy signer’s authority is too big and it will change the original signer’s will. The new scheme introduced threshold signature technology, which based on secret share thoughts, and constructed threshold proxy blind signature with certificateless cryptography. The scheme implementation process with detailed analysis showed that this scheme is easy to realize, and verified its security under the random oracle machine. It can be a good application in electronic voting and e-government affairs where user’s privacy should be protected.
Keywords:bilinear pairing   certificateless cryptography   threshold   proxy blind signature   random oracle machine
本文献已被 CNKI 等数据库收录!
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号