首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 640 毫秒
1.
Based on the Schnorr signature scheme, a new signature scheme with non-repudiation is proposed. In this scheme, only the signer and the designated receiver can verify the signature signed by the signer, and if necessary, both the signer and the designated receiver can prove and show the validity of the signature signed by the signer. The proof of the validity of the signature is noninteractive and transferable. To verify and prove the validity of the signature, the signer and the nominated receiver needn't store extra information besides the signature. At the same time, neither the signer nor the designated receiver can deny a valid signature signed. Then, there is no repudiation in this new signature scheme. According to the security analysis of this scheme, it is found the proposed scheme is secure against existential forgery on adaptive chosen message attack.  相似文献   

2.
在通常的代理签名方案中,任何人都可以验证代理签名的有效性。在定向代理签名方案中,由原始签名人指定一个人作为签名的接收者,以此来防止签名的滥用。当代理签名人产生签名后,只有指定的接收者可以对签名进行验证,进而接受签名。分析了Dai等定向代理签名方案,它不满足不可伪造性,即原始签名人可以成功伪造代理签名人的代理签名。为此,提出了改进的定向代理签名方案,该方案具有不可伪造性,从而有效地防止原始签名人对代理签名人进行恶意攻击,并将其推广到代理多签名方案中。  相似文献   

3.
0 IntroductionIdentity-based (ID-based) cryptography[1]is rapidly emer-gingin recent years .The concept of the proxy signature scheme was first in-troduced by Mamboet al[2]in 1996 .The concept of thresholdproxy signature was proposed[3 ,4]. Apractical and secure (t,n) threshold proxy signature scheme should satisfy the secre-cy,the proxy protected,the unforgeability,the non-repudia-tion,the ti me constraint ,andthe known signers[5].In 2006 , Baoet al[6]proposed an ID-based thresholdproxy si…  相似文献   

4.
In this present paper, we propose a new proxy blind signature scheme, which is publicly verifiable distributed. The algorithm uses the idea of secret sharing schemes to distribute original signer's ability and the power of the proxy signer, and ensure the property of publicly verifiable secret sharing schemes. A new concept "verifiable time period" is also introduced to reduce the time cost in the period of verifications and increases the efficiency of our scheme.  相似文献   

5.
弱仲裁量子签名的安全性依赖于量子力学的一些基本原理,其不仅比传统的数字签名具有更好的安全性,而且比仲裁量子签名计算效率较高.为此,给出了一种新型弱仲裁量子签名,该签名具有以下特点:(1)仲裁者并不参与签名的产生和验证过程,只在发生纠纷时,仲裁者才参与纠纷的解决;(2)通过利用签名者身份信息以及与密钥绑定的旋转算子对签名进行认证,可以抵抗伪造攻击,并具有不可否认性;(3)该签名方案具有基于身份的数字签名方案的优点,即用户的身份信息直接用作公钥,无须量子公钥证书,这将给用户提供更多的方便.  相似文献   

6.
将指定验证者的功能引进代理盲签名中,提出一种新的签名方案称为具有指定验证者的代理盲签名方案.代理签名者可以代表原始签名者对消息进行盲签名,只有消息拥有者指定的验证者验证代理签名的有效性.安全性分析表明新方案是安全的.  相似文献   

7.
We cryptanalyze Kim et al ‘ s onetime proxy signature scheme used in mobile agents, and then a successful forgery is introduced. It is showed that a dishonest customer can successfully forge a va[id onetime proxy signature by impersonating the server. Furthermore, he can request the server with responsibility for the forged bidding information.  相似文献   

8.
Combining the concept of partially blind signature with the concept of directed signature, we introduce a new concept of convertible directed partially blind signature (CDPBS), in which only the signer and the user can verify, confirm and disavow the validity of given signatures and convert given signatures into universally verifiable ones, to meet the need of signing personally or commercially sensitive messages. We give a formal definition of CDPBS and propose a concrete provably secure CDPBS scheme. The proposed scheme is efficient and secure, in which its unforgeability is the same as that of the Schnorr's signature scheme and its untransferability relies on the hardness of the decisional Diffie-Hellman problem. Furthermore, by letting the user's private key be a common constant, the proposed scheme can be used as a normal partially blind signature scheme.  相似文献   

9.
在代理签名中,原始签名人可以将数字签名的权力委托给代理签名人;而在盲签名方案中,签名者不能看到被签的消息的内容,签名被拥有者公布后,签名者不能追踪签名.针对陈玲玲等提出基于身份的代理盲签名方案进行分析,指出其代理密钥的生成时不安全的且签名是可追踪的,并提出了一个改进的方案.改进后的方案克服了原有的不安全,且效率更高.  相似文献   

10.
Efficient ID-Based Proxy Blind Signature Scheme   总被引:2,自引:0,他引:2  
0 Introduction Ablind signature, primitively introduced by Chaum[1], plays a central role in cryptographic protocols such as e-voting,e-payment that require user anonym- ity[2,3]. Such a signature allows a user to obtain a signa- ture of a message in a wa…  相似文献   

11.
A new sanitizable signature scheme is proposed, in which the security flaw of Miyazaki's sanitizable signature scheme SUMI-4 is improved. The new scheme overcomes the shortcomings of the original scheme SUM1-4 by using sanitizable authorization certificates. The new scheme enables the primitive signer to limit the sanitizer's power and still satisfies the security request of sanitizable signature.  相似文献   

12.
0 Introduction The concept of blind signature was firstly intro- duced by David Chaum in 1982[1]. Since then, scholars have tried their best to propose various blind signature schemes and applied them to some security systems, such as e-cash and e-voting …  相似文献   

13.
在分析了陈春华,徐秋亮(2007)提出的一个基于[HHW方案]的具有指定接收组特性的方案之后指出,这个方案的签名验证数据中没有回避孤悬因子,因此不具备强不可伪造性,即原始签名人可以伪造一个有效的代理签名通过验证,并成功地在代理签名人身份揭示阶段向公众证明该伪造的代理签名是由合法的代理签名人生成的.在分析该方案安全性的基础上提出了改进的方案.改进后的方案可以抵抗原始签名人的伪造攻击,具有强不可伪造性.  相似文献   

14.
An identity-based proxy blind signature scheme from bilinear pairings is introduced, which combines the advantages of proxy signature and blind signature. Furthermore, our scheme can prevent the original signer from generating the proxy blind signature, thus the profits of the proxy signer are guaranteed. We introduce bilinear pairings to minimize computational overhead and to improve the related performance of our scheme. In addition, the proxy blind signature presented is non-repudiable and it fulfills perfectly the security requirements of a proxy blind signature.  相似文献   

15.
在(t,n)门限代理签名方案中,原始签名人可将签名权授权给成员数为n的代理群,代理群中任何不少于t个代理签名人可代表原始签名人生成有效的签名.门限代理签名的特点使之具有广泛的实用性.目前所提出的门限代理签名方案多基于有限域上的离散对数问题.由于椭圆曲线密码体制在相同安全级别下,具有密钥短、速度快的优点,为此提出了一种基于椭圆曲线的不可否认门限代理签名方案,其安全性基于椭圆曲线离散对数问题难解性,同时可以在需要时实现对签名者的追查.安全性分析表明,该方案可有效地挫败合谋攻击和伪造攻击.同时由于椭圆曲线密码体制的特点,使该方案的计算量和通讯量都较小.  相似文献   

16.
代理盲签名技术是指由原始签名者授权的代理签名者在不知晓待签名的消息的具体内容的情况下完成签名的技术。代理盲签名技术可以保证消息的匿名性,将签名权外放,减轻签名者的负担,同时能保证签名的安全性,常被用于电子商务,电子现金交易和电子投票方面。提出了一个新的基于身份的代理盲签名方案,论证了方案的正确性和安全性,证实了该方案具有较高的效率,并阐述了其在电子现金领域的应用,尤其是在使用移动终端进行购物方面的应用。  相似文献   

17.
在提名代理签名中,原始签名方将签名权利委托给代理签名方,这时代理签名方还充当着提名者的角色,代理签名方(提名方)代表原始签名方产生提名签名,随后将生成的提名代理签名传递给被提名方加以验证.在提名代理签名中,除了要求具有代理签名的性质,还应有提名签名的性质,即提名性:仅有被提名者可以验证一个提名代理签名有效与否,而且如果必要,仅有被提名方可以向第三方证实这个代理提名签名有效与否.文章按照提名代理签名应满足的条件分析了Zhang等的方案.指出这些方案不满足提名性.在Zhang等的方案中,提名方也可以验证一个提名代理签名有效与否,而且也可以向第三方证实其有效性.  相似文献   

18.
提出一个基于身份的动态门限盲签名方案,签名者不知道他所签的消息的内容,签名信息不可追踪。 方案能够防止私钥生成器(PKG)伪造签名。 同时具有动态安全的特性,将签名的整个周期分成若干个时间段,每个时间段都要更新份额,且利用更新后的份额重构的密钥保持不变。 最后证明了方案的正确性、不可伪造性和鲁棒性。  相似文献   

19.
对张建中等提出的基于双线性对的随机化部分盲签名方案进行了安全性分析,发现方案不能抵抗篡改公共信息攻击.为此,提出了一个改进方案.分析结果表明,改进方案在满足不可伪造性、不可追踪性的同时,能够有效防止恶意的签名请求者非法修改事先协商的公共信息,保护签名者的合法权益.  相似文献   

20.
盲性是代理盲签名的一个重要特性。通过分析文献[1],发现其不具有盲性,对其进行了改进,改进后的方案克服了原方案的安全隐患,并且保留了原方案的其它优点。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号