A Secure Proxy Blind Signature Scheme Based on ECDLP

被引:1
作者
Hu, Lanlan [1 ]
Zheng, Kangfeng [1 ]
Hu, Zhengming [1 ]
Yang, Yixian [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Informat Secur Ctr, State Key Lab Networking & Switching Technol, Beijing 100088, Peoples R China
来源
MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS | 2009年
关键词
proxy blind signature; ECDLP; security;
D O I
10.1109/MINES.2009.220
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
To overcome the secure weakness of the existing proxy blind signature scheme based on ECDLP, an improved scheme is presented. The security of the improved scheme is enhanced by improving on the generate form of the proxy commission and the proxy private key in the proxy phase, the procedure of blinding and unblinding, and the corresponding verification equation of proxy blind signature. The analysis shows that the new scheme resolves secure problems in the former schemes, meets the seven aspects of security features needed by proxy blind signature scheme. The analytic results prove that the new scheme is more secure and practicable.
引用
收藏
页码:454 / 457
页数:4
相关论文
共 7 条
[1]  
[Anonymous], 2000, P INT C CHIN LANG CO
[2]  
Chaum D., 1983, Advances in Cryptology, Proceedings of Crypto 82, P199
[3]  
CHEN CH, 2007, COMPUTER ENG DESIGN, V28, P4354
[4]  
LEE B, 2001, AUSTR C INF SEC PRIV, P603
[5]  
Mambo M, 1996, IEICE T FUND ELECTR, VE79A, P1338
[6]  
Wang H, 2005, CHINESE J ELECTRON, V14, P281
[7]   The regularity analysis of multivariate refinable functions from generalized Bernstein bases and application in remote sensing image compression [J].
Yang, Xiaoyuan ;
Li, Bo ;
Zhang, Xudong ;
Yang, Rui .
INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2010, 87 (01) :12-37