Computer Science ›› 2019, Vol. 46 ›› Issue (6A): 358-361.

• Information Security • Previous Articles     Next Articles

Improved Efficient Proxy Blind Signature Scheme

WANG Xing-wei, HOU Shu-hui   

  1. School of Mathematics and Physics,University of Science and Technology Beijing,Beijing 100083,China
  • Online:2019-06-14 Published:2019-07-02

Abstract: Through the analysis of the certificateless proxy blind signature scheme,we found that the efficiency of the scheme is not high.Besides,although this scheme has been proved to be able to resist malicious but passive attacks of bad KGC,there is no such KGC that can be fully trusted in the real world.Based on ECDLP problem and Bilinear Pairing,this paper presented an improved efficient proxy blind signature scheme without KGC,and demonstrates the correctness and security of the scheme.

Key words: Digital signature, Efficiency analysis, KGC, Proxy blind signature

CLC Number: 

  • TP309
[1]CHAUM D.Blind Signature for Untraceable Payments[C]∥Advance in Cryptology:Proceedings of Crypto’82.1983:199-203.
[2]MAMBO M,USUDA K,OKAMOTO E.Proxy signa-ture for delegating signing operation[C]∥Proceedings of the 3rd ACM Conference on Computer and Communications Security.ACM,1996:48-57.
[3]LIN W D,JAN J K.A security personal learning tools using a proxy blind signature scheme[C]∥Proc of International Conference on Chinese Language Computing.2000:273-277.
[4]计国民.双线性对代理盲签名在电子选举中的应用[J].菏泽学院学报,2015,37(2):20-23.
[5]左黎明,郭红丽,张婷婷,等.一种无双线性对的代理盲签名方案[J].华东交通大学学报,2016,33(5):139-142.
[6]韩春霞,王琳杰.两种代理盲签名方案的安全性分析[J].科技信息,2013,23:53-61.
[7]林振宇,贺亚威,侯整风.改进的代理盲签名方案[J].合肥工业大学学报(自然科学版),2015,38(1):40-43.
[8]张瑛瑛,陈玮,曾吉文.对一个无证书代理盲签名方案的分析与改进[J].计算机应用研究,2014,31(2):540-542.
[9]农强,吴顺祥.一种基于身份的代理盲签名的分析与改进[J].计算机应用,2008,28(8):1940-1942.
[10]张晓敏.一类高效的无证书代理盲签名方案[J].计算机安全,2011(3):54-59.
[11]文佳骏,左黎明,李彪.一个高效的无证书代理盲签名方案[J].计算机工程与科学,2014,36(3):452-457.
[12]周明,王箭.一个可证安全的高效的代理盲签名方案[J].计算机工程与科学,2015,37(9):1643-1651.
[13]BARRETO P S L M.GALBRAITH S D,O’HEIGEARTAIGH C,et al.Efficient pairing computation on super singular abelian varieties[J].Designs,Codes and Cryptography,2007,42(3):239-271.
[14]梁林.一种新的基于身份的代理盲签名方案[J].赤峰学院学报(自然科学版)2017,33(2):22-24.
[15]刘二根,王霞,周华静,等.改进的无证书代理盲签名方案[J].计算机科学,2016,43(8):92-94.
[1] REN Chang, ZHAO Hong, JIANG Hua. Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [J]. Computer Science, 2022, 49(5): 333-340.
[2] JIANG Hao-kun, DONG Xue-dong, ZHANG Cheng. Improved Certificateless Proxy Blind Signature Scheme with Forward Security [J]. Computer Science, 2021, 48(6A): 529-532.
[3] DAI Chuang-chuang, LUAN Hai-jing, YANG Xue-ying, GUO Xiao-bing, LU Zhong-hua, NIU Bei-fang. Overview of Blockchain Technology [J]. Computer Science, 2021, 48(11A): 500-508.
[4] ZHANG Jun-he, ZHOU Qing-lei and HAN Ying-Jie. Sanitizable Signature Scheme Based on Ring Signature and Short Signature [J]. Computer Science, 2020, 47(6A): 386-390.
[5] JIANG Ze-tao, XU Juan-juan. Efficient Heterogeneous Cross-domain Authentication Scheme Based on Proxy Blind Signature in Cloud Environment [J]. Computer Science, 2020, 47(11): 60-67.
[6] ZUO Li-ming,CHEN Lan-lan. Special Digital Signature Scheme Based on Identity Identification and Its Application [J]. Computer Science, 2020, 47(1): 309-314.
[7] LIU Ya-qiang,LI Xiao-yu. Mobile Secure Payment Scheme Using Identity-based Cryptographic Algorithm+SMS Verification Code [J]. Computer Science, 2020, 47(1): 293-301.
[8] LI Lei, JIA Hui-wen, BAN Xue-hua and HE Yu-fan. Obfuscation-based Broadcasting Multi-signature Scheme [J]. Computer Science, 2017, 44(Z11): 329-333.
[9] YE Jun-yao, ZHENG Dong and REN Fang. Improved Veron’s Identification with Lightweight Structure and Digital Signature Scheme [J]. Computer Science, 2017, 44(3): 168-174.
[10] LIU Er-gen, WANG Xia, ZHOU Hua-jing and GUO Hong-li. Improved Certificateless Proxy Blind Signature Scheme [J]. Computer Science, 2016, 43(8): 92-94.
[11] REN Yan. Deniable Attribute-based Designated Confirmer Signature without Random Oracles [J]. Computer Science, 2016, 43(7): 162-165.
[12] WANG Hu-qing and SUN Zhi-xin. Research on ONS Security [J]. Computer Science, 2016, 43(1): 1-7.
[13] LIU Ya-li, QIN Xiao-lin, ZHAO Xiang-jun, HAO Guo-sheng and DONG Yong-quan. Lightweight RFID Authentication Protocol Based on Digital Signature [J]. Computer Science, 2015, 42(2): 95-99.
[14] ZHOU Ke-yuan. Digital Signature Scheme Based on Elliptic Curve and Factoring [J]. Computer Science, 2014, 41(Z6): 366-368.
[15] CAO Shuai and WANG Shu-ying. Research on Security Technology of Workflow Customization for Collaborative SaaS Platform of Industrial Chains [J]. Computer Science, 2014, 41(1): 230-234.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!