首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 93 毫秒
1.
Fail-stop signature schemes provide security for a signer against forgeries of an enemy with unlimited computational power by enabling the signer to provide a proof of forgery when a forgery happens. Chang et al proposed a robust fail-stop blind signature scheme based on bilinear pairings. However, in this paper, it will be found that there are several mistakes in Chang et al's fail-stop blind signature scheme. Moreover, it will be pointed out that this scheme doesn't meet the property of a fail-stop signature: unconditionally secure for a signer. In Chang et al's scheme, a forger can forge a valid signature that can't be proved by a signer using the "proof of forgery". The scheme also doesn't possess the unlinkability property of a blind signature.  相似文献   

2.
Another ID-Based Proxy Signature Scheme and Its Extension   总被引:1,自引:0,他引:1  
So fur, the security of many proxy signatures has seldom been considered in a formal way and most of them cannot satisfy nonepudiation. In this work, a novel ID-based (Identity-based) proxy signature scheme is proposed by combining the proxy signature with ID-based public cryptography, and they formalize the notion of security for ID-based proxy signature schemes. And show that the security of the proposed scheme is secure. Compured with other proxy signature schemes, it does not need a secure channel. Thus, it is particularly suitable for the unreliable network computation environment. Finally, they extend proposed scheme to a proxy multi-signature which has the following advantages (1) the size of proxy multi- signature is independent of the number of delegating users; (2) the computation cost of proxy multi-signature only need two Weil paring.  相似文献   

3.
Many identity-based signature (IBS) schemes solving key escrow were proposed, But the updating of the private keys wasn't discussed in these literatures. For the problem of key update, an identity-based key-insulated signature scheme with secure key-updates has been proposed. But their scheme inherited the key escrow property. In this paper, we propose a new identity-based strong key-insulated signature scheme without key escrow. It makes the IBS scheme more applicable to the real world. After analyzing the security and the performance, an application example in E-passport passive authentication scenario is described.  相似文献   

4.
A new sanitizable signature scheme is proposed, in which the security flaw of Miyazaki's sanitizable signature scheme SUMI-4 is improved. The new scheme overcomes the shortcomings of the original scheme SUM1-4 by using sanitizable authorization certificates. The new scheme enables the primitive signer to limit the sanitizer's power and still satisfies the security request of sanitizable signature.  相似文献   

5.
In this present paper, we propose a new proxy blind signature scheme, which is publicly verifiable distributed. The algorithm uses the idea of secret sharing schemes to distribute original signer's ability and the power of the proxy signer, and ensure the property of publicly verifiable secret sharing schemes. A new concept "verifiable time period" is also introduced to reduce the time cost in the period of verifications and increases the efficiency of our scheme.  相似文献   

6.
分析了几个基于身份的代理签名和盲签名,指出它们具有无条件信任私钥产生中心(PKG,Private Key Generator)的共同点.但在实际环境中这个假设并不总是成立.文章结合代理签名和盲签名,利用双线性映射中离散对数难解的特点,在已有基于身份无可信中心签名的基础上,构造了一类基于身份无可信中心的代理盲签名方案.分析表明,提出的代理盲签名是安全有效的.  相似文献   

7.
In a blind signcryption, besides the functions of digital signature and encryption algorithm for authentication and confidentiality, a user can delegates another user's capability with the anonymity of the participants guaranteed. Some blind signcryptions were proposed but without a blind signcryption with public public verifiability. In this paper, verifiability that is proved to be efficient and secure is proposed. Through the security analysis, we proved that the scheme can offer confidentiality, integrity, unforgeability, non-repudiation and public verifiability. The coming research direction is also summarized.  相似文献   

8.
0 Introduction The concept of blind signature was firstly intro- duced by David Chaum in 1982[1]. Since then, scholars have tried their best to propose various blind signature schemes and applied them to some security systems, such as e-cash and e-voting …  相似文献   

9.
In existing software registration schemes, the privacy of users is not taken into account and may be in the risks of abuses. In this paper, we proposed a novel software registration system which can greatly reduce unauthorized use of software while keeping the privacy of users. To the best of our knowledge, this is the first system that the privacy of users is guaranteed in software registration. Our system enjoys a modular design and can be implemented by any secure ID-based partially blind signature scheme. Furthermore, the proposal allows flexible registration information definition. This feature makes our scheme flexible and practical for more software registration applications.  相似文献   

10.
在指定接收者恢复消息签名方案的基础上加入了前向安全性,提出一种新的部分盲签名方案.新方案能够减少通信量,避免因密钥的泄露而导致以前的所有签名无效,只有指定的接收者才能恢复原始消息,进一步加强了消息的隐秘性.新方案中签名发起人和签名者合作完成签名,签名密钥按周期更新,在签名过程中加入了最终可恢复消息的接收者的信息.安全性分析表明新方案满足部分盲性、前向安全性和不可伪造性等安全性要求.  相似文献   

11.
多代理签名是一种特殊的数字签名技术,它允许一个原始签名人授权给一组代理签名人,让他们替代行使签名权.在盲签名中,消息的内容对签名者是不可见的,签名被用户泄露后,签名者不能追踪签名.结合多代理签名和盲签名,基于双线性配对首先设计了一个安全有效的多代理盲签名方案.该方案实现了多个代理签名人进行盲签名和公开信道授权.  相似文献   

12.
In this paper, we re-formalize the security notions of universal designated multi verifier signature (UDMVS) schemes. Then the first UDMVS scheme is presented in the standard model (i.e. without random oracles) based on Waters' signature scheme. In this setting, a signature holder can to designate the signature to multi verifiers. Moreover, the security of our proposed scheme is based on the Gap Bilinear Difffie-Hellman assumption.  相似文献   

13.
Based on the Schnorr signature scheme, a new signature scheme with non-repudiation is proposed. In this scheme, only the signer and the designated receiver can verify the signature signed by the signer, and if necessary, both the signer and the designated receiver can prove and show the validity of the signature signed by the signer. The proof of the validity of the signature is noninteractive and transferable. To verify and prove the validity of the signature, the signer and the nominated receiver needn't store extra information besides the signature. At the same time, neither the signer nor the designated receiver can deny a valid signature signed. Then, there is no repudiation in this new signature scheme. According to the security analysis of this scheme, it is found the proposed scheme is secure against existential forgery on adaptive chosen message attack.  相似文献   

14.
基于离散对数的困难性,利用GOST数字签名算法提出一种新的完全有效的代理盲签名方案,该方案高效安全,在发送代理子密钥时需要安全的秘密通道.  相似文献   

15.
0 Introduction The advent of E-commerce demands for a secure communication of digital information. It has been proven for years that this can be achieved by cryptography. Digital signature schemes are essential for E-commerce as they allow one to authoriz…  相似文献   

16.
目的 研究了几个无证书的部分盲签名方案,对其中的一个签名方案分析发现其存在严重的安全缺陷,并对出现伪造攻击的原因进行分析.方法 在签名阶段加入公共信息,并在签名时改变签名的形式.结果与结论 分析表明,改进方案不仅满足部分盲性,而且可以防止对公共信息的更改,并在随机预言模型下证明新方案是不可伪造的.  相似文献   

17.
前向安全的签名方案在当前签名密钥泄漏后,也能确保用户此前所作签名的合法性;而环签名能保证签名用户的无条件匿名性。基于保护前向安全性和无条件匿名性的要求,本文利用双线性对提出了一种新的前向安全的环签名方案,并在标准模型下证明其能抵抗伪造签名攻击,适用于对安全性能要求较高且匿名的场合。  相似文献   

18.
为了提高盲签名的签名效率和安全性,学者们提出了多种部分盲签名方案。对其中的两种签名方案分析发现,都存在严重的安全缺陷,其中一种方案存在公钥替换攻击,而另一种方案中不诚实的签名请求者可任意篡改公共协商信息。针对这些安全缺陷,提出了一种新的无证书部分盲签名方案,改进存在的安全缺陷。分析表明,新方案不仅改进了已有方案的安全缺陷,且计算性能更优。  相似文献   

19.
Signcryption is a cryptographic primitive that performs encryption and signature in a single logical step more efficiently than sign-then-encrypt approach. Till now, various kinds of signcryption schemes have been proposed. Among them, the requirement of signcrypter's privacy protection is needful in some practical applications. In this paper, a new identity-based anonymous signcryption scheme from hilinear pairings, which is the organic combination of identity-based ring signature and encryption scheme, is proposed. The proposed scheme is indistinguishable against the chosen ciphertext attack under the Decisional Bilinear Diffie-Hellman assumption in the random oracle model. Its unforgeability relies on the computational Diffieellman problem. Compared with the previous schemes, the new scheme is more efficient in computation.  相似文献   

20.
Forward secure signature can protect the security of signatures previous to the key exposure. Server-assisted signature is a special digital signature in which the signer allies one server to produce the signatures. In this paper, server-assisted for-ward-secure threshold signature is proposed. The system is composed of n1 servers and n2 users. Each user and each server holds a partial secret, respectively. To produce a valid signature, users and servers need to cooperate to complete the work. The partial secrets of the users and servers are updated by a one-way function at regular intervals, while the public key is always fixed. Even if all the current partial secrets are exposed, the signatures pertaining to previous periods are still valid.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号