A certificateless restrictive partially blind signature scheme

被引:6
|
作者
Wang, Changji [1 ,2 ,3 ]
Lu, Rongbo [4 ]
机构
[1] Sun Yat Sen Univ, Dept Comp Sci, Guangzhou 510275, Guangdong, Peoples R China
[2] Sun Yat Sen Univ, Guangdong Prov Informat Secur Key Lab, Guangzhou 510275, Guangdong, Peoples R China
[3] Sun Yat Sen Univ, Key Lab Digital Life, Minist Educ, Guangzhou 510275, Guangdong, Peoples R China
[4] Jishou Univ, Dept Comp Sci, Jishou 416000, Hunan, Peoples R China
来源
2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS | 2008年
基金
中国国家自然科学基金;
关键词
D O I
10.1109/IIH-MSP.2008.109
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Restrictive partially blind signatures incorporate the idea of partially blind signatures and restrictive blind Signatures, which have the property of partial blindness and restrictive blindness. The existing restrictive partially blind signature schemes were constructed under certificate-based public key cryptosystems or identity-based public key cryptosystems up to now. In this paper, we propose the first certificateless restrictive partially blind signature schemes from bilinear pairings, and prove the proposed scheme to be secure in the random oracle model.
引用
收藏
页码:279 / +
页数:2
相关论文
共 50 条
  • [1] A Certificateless Partially Blind Signature Scheme
    Tang, P. Z.
    Yang, J. F.
    Zhang, Q. L.
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND INFORMATION TECHNOLOGY (SEIT2015), 2016, : 83 - 87
  • [2] Cryptoanalysis of Certificateless Partially Blind Signature and Proxy Blind Signature Scheme
    Zhang, Jianhong
    Chen, Hua
    Geng, Qin
    PROCEEDINGS OF THE 2009 2ND INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOLS 1-9, 2009, : 1491 - 1495
  • [3] Analysis and Improvement of Certificateless Partially Blind Signature Scheme
    Liu, E. G.
    Wang, X.
    Zhou, H. J.
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND INFORMATION TECHNOLOGY (SEIT2015), 2016, : 78 - 82
  • [4] certificateless partially-blind signature scheme with provable security
    Zhao Z.-G.
    1600, Univ. of Electronic Science and Technology of China (45): : 812 - 818
  • [5] Certificateless blind signature scheme
    Su, Wan-Li
    Zhang, Yue-Yu
    Zhang, Xiao-Hong
    Wang, Yu-Min
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2009, 38 (04): : 533 - 536
  • [6] Cryptanalysis of a Certificateless Partially Blind Signature
    Cheng, Lin
    Wen, Qiao Yan
    Bo, Dong
    COMPUTER AND INFORMATION TECHNOLOGY, 2014, 519-520 : 462 - +
  • [7] Certificateless Proxy Blind Signature Scheme
    Yu Meisheng
    Wu Xiaojuan
    Guan Jian
    Yu Haixia
    2009 WRI WORLD CONGRESS ON SOFTWARE ENGINEERING, VOL 2, PROCEEDINGS, 2009, : 177 - 180
  • [8] An efficient ID-based restrictive partially blind signature scheme
    Hu, Xiaoming
    Huang, Shangteng
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 205 - +
  • [9] An improved ID-based restrictive partially blind signature scheme
    Wang, Shangping
    Han, Pei
    Zhang, Yaling
    Wang, Xiaofeng
    PROCEEDINGS OF NINTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING, 2008, : 295 - 300
  • [10] Cryptanalysis and improvement of a certificateless partially blind signature
    Cheng, Lin
    Wen, Qiaoyan
    IET INFORMATION SECURITY, 2015, 9 (06) : 380 - 386