New proxy blind signature scheme with proxy revocation

被引:0
作者
Information Science and Engineering Institute, Yanshan University, Qinhuangdao 066004, China [1 ]
不详 [2 ]
机构
[1] Information Science and Engineering Institute, Yanshan University
[2] Computer Science and Engineering Institute, Harbin Institute of Technology
来源
Dianzi Yu Xinxi Xuebao | 2008年 / 10卷 / 2468-2471期
关键词
Proxy blind signature; Proxy misuse; Proxy revocation; Proxy signature;
D O I
10.3724/sp.j.1146.2007.00423
中图分类号
学科分类号
摘要
According to the problems of proxy revocation, original signer's forgery and proxy misuse in proxy signature, a secure proxy blind signature scheme with proxy revocation is proposed. In phase of signature, by embedding non-blind time-stamp in the Abe-Okamoto partially blind signature, the original signer can revoke delegation whenever necessary and all valid proxy signatures generated earlier can longer be verified. Besides having the basic properties of the proxy signature, the new scheme prevents proxy misuse, original signer's forgery and public key substitution attack.
引用
收藏
页码:2468 / 2471
页数:3
相关论文
共 8 条
[1]  
Tan Z., Liu Z., Tang C., Digital Proxy Blind Signature Schemes Based on DLP and ECDLP, 21, pp. 212-217, (2002)
[2]  
Lu E.J.-L., Hwang M.-S., Huang C.-J., A new proxy signature scheme with revocation, Applied Mathematics and Computation, 161, 3, pp. 799-806, (2005)
[3]  
Wang X.-M., Zhang Z., Fu F.-W., A secure threshold proxy signature scheme, Journal of Electronics and Information Technology, 28, 7, pp. 1308-1311, (2006)
[4]  
Abe M., Okamoto T., Provably secure partially blind signatures, Advances in Cryptology: Crypto' 2000, pp. 271-286, (2000)
[5]  
Mambo M., Usuda K., Okamoto E., Proxy signatures: Delegation of the power to sign messages, IEICE Trans. Fundamentals, E79-A, 9, pp. 1338-1354, (1996)
[6]  
Mambo M., Usuda K., Okamoto E., Proxy signatures for delegating signing operation, Proc. 3rd ACM Conference on Computer and Communications Security, pp. 48-57, (1996)
[7]  
Wang S.H., Wang G.L., Bao F., Et al., Cryptanalysis of a proxy-protected proxy signature scheme based on elliptic curve cryptosystem, Vehicular Technology Conference, pp. 3240-3243, (2004)
[8]  
Li J.-G., Cao Z.-F., Li J.-Z., Et al., Present situation and progress of proxy signature, Journal of China Institute of Communications, 24, 10, pp. 114-124, (2003)