Efficient ID-based Proxy Blind Signature Schemes from Pairings

被引:3
|
作者
Pan, Heng
Ke, Ke
Gu, Chunxiang
机构
来源
2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS | 2008年
关键词
D O I
10.1109/CIS.2008.101
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the last couple of years, identity based cryptography has got fruitful achievements. Proxy blind signature scheme enables a proxy signer to make blind signature on behalf of the original signer. This paper proposes an ID-based proxy blind signature scheme based on the bilinear pairings. We also analysis the scheme's correctness, efficiency and blindness property.
引用
收藏
页码:390 / 393
页数:4
相关论文
共 50 条
  • [1] Efficient ID-based blind signature and proxy signature from bilinear pairings
    Zhang, FG
    Kim, K
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2003, 2727 : 312 - 323
  • [2] An efficient ID-Based proxy signature scheme from pairings
    Gu, Chunxian
    Zhu, Yuefei
    INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 40 - 50
  • [3] An ID-based proxy signature schemes without bilinear pairings
    He Debiao
    Chen Jianhua
    Hu Jin
    ANNALS OF TELECOMMUNICATIONS, 2011, 66 (11-12) : 657 - 662
  • [4] An ID-based proxy signature schemes without bilinear pairings
    He Debiao
    Chen Jianhua
    Hu Jin
    annals of telecommunications - annales des télécommunications, 2011, 66 : 657 - 662
  • [5] ID-based ring signature and proxy ring signature schemes from bilinear pairings
    Department of Mathematics, Pranveer Singh Institute of Technology, Kalpi Road, Bhauti, Kanpur, India
    不详
    Int. J. Netw. Secur., 2007, 2 (187-192):
  • [6] Efficient ID-based proxy chameleon signature from bilinear pairings
    Zhang, Miaomiao
    Chen, Gongliang
    Li, Jianhua
    FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 135 - +
  • [7] ID-based group-oriented proxy signature and blind signature from pairings
    Chen, XF
    Zhang, FG
    CHINESE JOURNAL OF ELECTRONICS, 2006, 15 (01): : 12 - 16
  • [8] Efficient ID-based blind signature schemes
    Ming, Yang
    Wang, Yumin
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 260 - 264
  • [9] Efficient ID-based proxy signature and proxy signcryption form bilinear pairings
    Wang, Q
    Cao, ZF
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 167 - 172
  • [10] ID-based, blind signature and ring signature from pairings
    Zhang, FG
    Kim, K
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS, 2002, 2501 : 533 - 547