Efficient ID-based Proxy Blind Signature Schemes from Pairings

被引:3
|
作者
Pan, Heng
Ke, Ke
Gu, Chunxiang
机构
来源
2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS | 2008年
关键词
D O I
10.1109/CIS.2008.101
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the last couple of years, identity based cryptography has got fruitful achievements. Proxy blind signature scheme enables a proxy signer to make blind signature on behalf of the original signer. This paper proposes an ID-based proxy blind signature scheme based on the bilinear pairings. We also analysis the scheme's correctness, efficiency and blindness property.
引用
收藏
页码:390 / 393
页数:4
相关论文
共 50 条
  • [41] An efficient ID-based partially blind signature scheme
    Hu, Xiaoming
    Huang, Shangteng
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 291 - +
  • [42] Efficient ID-based (restrictive) partially blind signature
    Cui, Wei
    Xin, Yang
    Hu, Cheng-Yu
    Yang, Yi-Xian
    Li, Zhong-Xian
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2008, 31 (04): : 53 - 57
  • [43] A NEW ID-BASED PROXY BLIND SIGNATURE SCHEME WITH MESSAGE RECOVERY
    Kong, Tingting
    Xu, Qiuliang
    Wong, Zhiqiang
    3RD INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE (IEEC 2011), PROCEEDINGS, 2011, : 162 - 165
  • [44] ID-based threshold proxy signcryption scheme from bilinear pairings
    School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 610054 Sichuan, China
    不详
    不详
    Int. J. Secur. Netw., 2008, 3 (206-215):
  • [45] Generalized ID-Based Blind Signatures From Bilinear Pairings
    Kalkan, Said
    Kaya, Kamer
    Selcuk, Ali Aydin
    23RD INTERNATIONAL SYMPOSIUM ON COMPUTER AND INFORMATION SCIENCES, 2008, : 213 - 218
  • [46] Efficient ID-Based Ring Signature and Ring Signcryption Schemes
    Zhu, Lijun
    Zhang, Futai
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 866 - 870
  • [47] On the Linkability of Two Schnorr Type ID-based Blind Signature Schemes
    Zhang Jianhong
    Chen Hua
    Gao Shengnan
    Geng Qin
    2009 INTERNATIONAL FORUM ON COMPUTER SCIENCE-TECHNOLOGY AND APPLICATIONS, VOL 2, PROCEEDINGS, 2009, : 265 - 269
  • [48] New ID-based threshold signature scheme from bilinear pairings
    Chen, XF
    Zhang, FG
    Konidala, DM
    Kim, K
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2004, PROCEEDINGS, 2004, 3348 : 371 - 383
  • [49] A short ID-based proxy signature scheme
    Asaar, Maryam Rajabzadeh
    Salmasizadeh, Mahmoud
    Susilo, Willy
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (05) : 859 - 873
  • [50] An efficient ID-based restrictive partially blind signature scheme
    Hu, Xiaoming
    Huang, Shangteng
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 205 - +