PROXY BLIND SIGNATURE SCHEME FOR ID-BASED DESIGNATED VERIFIER

被引:0
|
作者
Zhang, Xiaozhi [1 ]
Xi, Junfu [1 ]
Wang, Zhengqiang [1 ]
机构
[1] Xingtai Polytech Coll, Dept Informat Engn, Xingtai, Peoples R China
来源
2011 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATIONS AND CONTROL (ICECC) | 2011年
关键词
proxy blind signature; designated; multi-signature; PKG;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the proxy blind signature scheme, the problem that how to prevent the counterfeit signature of proxy is urgently to be solved. In this paper, we propose a new scheme for id-based designated verifier-proxy blind signature by using bilinear map, which combines proxy signature and blind signature. In this scheme, it can only allow the designated person to verify the signature's validity, which can prevent the signer from forging the signature and protect the rights of proxy signer.. Through analyzing the scheme, it proves that the scheme meets the blind properties of the proxy blind multi-signature, such as blindness, non-forgeability, and distinguish ability.
引用
收藏
页码:376 / 379
页数:4
相关论文
共 50 条
  • [1] ID-based designated multi verifier proxy signature scheme
    Tang, Zhao-Xia
    Xu, Qiu-Liang
    Zhu, Jian-Dong
    Tongxin Xuebao/Journal on Communication, 2008, 29 (SUPPL.): : 41 - 45
  • [2] An ID-Based Designated-Verifier Proxy Multi-Signature Scheme
    Zuo, Weiping
    Liu, Yunfang
    Wang, Sanfu
    2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 576 - 579
  • [3] A Provably Secure ID-based Designated Verifier Proxy Signature Scheme Based on DLP
    Wei, Baodian
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4, 2013, 411-414 : 721 - 724
  • [4] A novel ID-based designated verifier signature scheme
    Zhang, Jianhong
    Mao, Jane
    INFORMATION SCIENCES, 2008, 178 (03) : 766 - 773
  • [5] Provably secure blind ID-based strong designated verifier signature scheme
    Zhang, Ning
    Wen, Qiaoyan
    2007 SECOND INTERNATIONAL CONFERENCE IN COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1 AND 2, 2007, : 358 - 362
  • [6] A SECURE ID-BASED STRONG DESIGNATED VERIFIER SIGNATURE SCHEME
    Yang, Bo
    Xiao, Zibi
    Hu, Zhengming
    2009 IEEE INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT, PROCEEDINGS, 2009, : 543 - +
  • [7] A Novel ID-Based Strong Designated Verifier Signature Scheme
    Du, Hongzhen
    Huang, Meijuan
    ADVANCES IN MANUFACTURING TECHNOLOGY, PTS 1-4, 2012, 220-223 : 2870 - 2874
  • [8] Strong designated Verifier ID-based Ring Signature Scheme
    Wu Lei
    Li Daxing
    ISISE 2008: INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING, VOL 1, 2008, : 294 - +
  • [9] ID-based proxy blind signature scheme
    School of Mathematics and Computer Science, Nanjing Normal University, Nanjing 210097, China
    不详
    Jisuanji Gongcheng, 2006, 17 (203-204+224):
  • [10] Efficient ID-based Designated Verifier Signature
    Blazy, Olivier
    Conchon, Emmanuel
    Germouty, Paul
    Jambert, Amandine
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,