Computer Science ›› 2016, Vol. 43 ›› Issue (8): 92-94.doi: 10.11896/j.issn.1002-137X.2016.08.019

Previous Articles     Next Articles

Improved Certificateless Proxy Blind Signature Scheme

LIU Er-gen, WANG Xia, ZHOU Hua-jing and GUO Hong-li   

  • Online:2018-12-01 Published:2018-12-01

Abstract: Through the security analysis of the certificateless proxy blind signature scheme proposed by Zhang Xiao-min,it was found that the scheme can not resist the malicious-but-passive KGC attack and signature forgery attack,in addition,KGC collusion with the original signer can get proxy key.In order to avoid these attacks,an improved certificateless proxy blind signature scheme was presented,and it has a better security.

Key words: Proxy blind signature,Malicious-but-passive KGC attack,Proxy key

[1] Al-Riyami S,Paterson K.Certicateless public key cryptography[M]∥Laih C S,ed.Advances in Cryptology-ASIACRYPT 2003.LNCS 2894,Berlin:Springer-Verlag,2003.452-473
[2] Zhou Cai-xue.Cryptanalysis and improvement of three ceritifi-cateless signature schemes[J].Computer Engineering,2012,38(19):114-118(in Chinese) 周才学.三个无证书签名方案的密码学分析与改进[J].计算机工程,2012,38(19):114-118
[3] Wang Sheng-bao,Liu Wen-hao,Xie Qi.Certificateless signature scheme without bilinear pairings[J].Journal on Communications,2012,3(4):93-98(in Chinese) 王圣宝,刘文浩,谢琪.无双线性配对的无证书签名方案[J].通信学报,2012,33(4):93-98
[4] Chaum D.Blind Signatures for Untraceable Payments[C]∥Advance in Cryptology: Proceedings of Crypto’82.1983:199-203
[5] Mambo M,Usuda K,Okamoto E.Proxy signatures for delegating signing operation[C]∥Proceedings of 3rd ACM Conference on Computer and Communications Security.New York:ACM Press,1996:48-57
[6] Lin W D,Jan J K.A security personal learning tools using aproxy blind signature scheme[C]∥Proc of International Conference on Chinese Language Computing.2000:273-277
[7] Song Min,Zhang Yue-gong.An improved certificateless proxy blind signature scheme[C]∥Proceedings of the 14th IEEE Conference on Communication Technology (ICCT).2012:645-649
[8] Zhang Bi-jun,He Ming-xing.An e-voting scheme based on proxy blind signature[J].Journal of Xihua University(Natural Science),2013,32(4):10-13(in Chinese) 张碧军,何明星.一个基于代理盲签名的电子选举方案[J].西华大学学报(自然科学版),2013,32(4):10-13
[9] Zhang Ying-ying,Chen Wei,Zeng Ji-wen.Analysis and improvement of a certificateless proxy blind signature[J].Application Research of Computers,2014,1(2):540-542(in Chinese) 张瑛瑛,陈玮,曾吉文.对一个无证书代理盲签名方案的分析与改进[J].计算机应用研究,2014,31(2):540-542
[10] Huang Juan,Du Wei-zhang.Certificateless proxy blind signature scheme[J].Computer Engineering and Applications,2011,47(31):73-75(in Chinese) 黄隽,杜伟章.无证书代理盲签名方案[J].计算机工程与应用,2011,47(31):73-75
[11] Zhang J Z,Yang L.Cryptography analysis and improvement on certificateless proxy blind signature scheme[J].Computer Engineering and Applications,2014,50(4):90-93(in Chinese) 张建中,杨丽.无证书代理盲签名方案的密码学分析与改进[J].计算机工程与应用,2014,50(4):90-93,156
[12] Zhang Xiao-min.An efficient certificateless proxy blind signa-ture scheme[J].Computer Security,2011(3):54-59(in Chinese) 张晓敏.一类高效的无证书代理盲签名方案[J].计算机安全,2011(3):54-59

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!