计算机科学 ›› 2016, Vol. 43 ›› Issue (8): 92-94.doi: 10.11896/j.issn.1002-137X.2016.08.019

• 信息安全 • 上一篇    下一篇

改进的无证书代理盲签名方案

刘二根,王霞,周华静,郭红丽   

  1. 华东交通大学理学院 南昌330013华东交通大学系统工程与密码学研究所 南昌330013,华东交通大学理学院 南昌330013华东交通大学系统工程与密码学研究所 南昌330013,华东交通大学理学院 南昌330013华东交通大学系统工程与密码学研究所 南昌330013,华东交通大学理学院 南昌330013华东交通大学系统工程与密码学研究所 南昌330013
  • 出版日期:2018-12-01 发布日期:2018-12-01
  • 基金资助:
    本文受国家自然科学基金项目(11361024,9,61472138,2),江西省高校科技落地计划项目(KJLD12067),华东交通大学校立科研基金项目(11JC04),江西省科技厅科技项目(20151BDH80071)资助

Improved Certificateless Proxy Blind Signature Scheme

LIU Er-gen, WANG Xia, ZHOU Hua-jing and GUO Hong-li   

  • Online:2018-12-01 Published:2018-12-01

摘要: 通过对张晓敏提出的高效无证书代理盲签名方案进行安全性分析,发现该方案不能抵抗恶意但被动的KGC攻击,也不能抵抗普通攻击者的签名伪造攻击,而且KGC与原始签名者联合可以获得代理密钥。为了避免这些攻击,提出了一种改进的无证书代理盲签名方案,且该方案具有更高的安全性。

关键词: 代理盲签名,恶意但被动的KGC攻击,代理密钥

Abstract: Through the security analysis of the certificateless proxy blind signature scheme proposed by Zhang Xiao-min,it was found that the scheme can not resist the malicious-but-passive KGC attack and signature forgery attack,in addition,KGC collusion with the original signer can get proxy key.In order to avoid these attacks,an improved certificateless proxy blind signature scheme was presented,and it has a better security.

Key words: Proxy blind signature,Malicious-but-passive KGC attack,Proxy key

[1] Al-Riyami S,Paterson K.Certicateless public key cryptography[M]∥Laih C S,ed.Advances in Cryptology-ASIACRYPT 2003.LNCS 2894,Berlin:Springer-Verlag,2003.452-473
[2] Zhou Cai-xue.Cryptanalysis and improvement of three ceritifi-cateless signature schemes[J].Computer Engineering,2012,38(19):114-118(in Chinese) 周才学.三个无证书签名方案的密码学分析与改进[J].计算机工程,2012,38(19):114-118
[3] Wang Sheng-bao,Liu Wen-hao,Xie Qi.Certificateless signature scheme without bilinear pairings[J].Journal on Communications,2012,3(4):93-98(in Chinese) 王圣宝,刘文浩,谢琪.无双线性配对的无证书签名方案[J].通信学报,2012,33(4):93-98
[4] Chaum D.Blind Signatures for Untraceable Payments[C]∥Advance in Cryptology: Proceedings of Crypto’82.1983:199-203
[5] Mambo M,Usuda K,Okamoto E.Proxy signatures for delegating signing operation[C]∥Proceedings of 3rd ACM Conference on Computer and Communications Security.New York:ACM Press,1996:48-57
[6] Lin W D,Jan J K.A security personal learning tools using aproxy blind signature scheme[C]∥Proc of International Conference on Chinese Language Computing.2000:273-277
[7] Song Min,Zhang Yue-gong.An improved certificateless proxy blind signature scheme[C]∥Proceedings of the 14th IEEE Conference on Communication Technology (ICCT).2012:645-649
[8] Zhang Bi-jun,He Ming-xing.An e-voting scheme based on proxy blind signature[J].Journal of Xihua University(Natural Science),2013,32(4):10-13(in Chinese) 张碧军,何明星.一个基于代理盲签名的电子选举方案[J].西华大学学报(自然科学版),2013,32(4):10-13
[9] Zhang Ying-ying,Chen Wei,Zeng Ji-wen.Analysis and improvement of a certificateless proxy blind signature[J].Application Research of Computers,2014,1(2):540-542(in Chinese) 张瑛瑛,陈玮,曾吉文.对一个无证书代理盲签名方案的分析与改进[J].计算机应用研究,2014,31(2):540-542
[10] Huang Juan,Du Wei-zhang.Certificateless proxy blind signature scheme[J].Computer Engineering and Applications,2011,47(31):73-75(in Chinese) 黄隽,杜伟章.无证书代理盲签名方案[J].计算机工程与应用,2011,47(31):73-75
[11] Zhang J Z,Yang L.Cryptography analysis and improvement on certificateless proxy blind signature scheme[J].Computer Engineering and Applications,2014,50(4):90-93(in Chinese) 张建中,杨丽.无证书代理盲签名方案的密码学分析与改进[J].计算机工程与应用,2014,50(4):90-93,156
[12] Zhang Xiao-min.An efficient certificateless proxy blind signa-ture scheme[J].Computer Security,2011(3):54-59(in Chinese) 张晓敏.一类高效的无证书代理盲签名方案[J].计算机安全,2011(3):54-59

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!