Advanced Search
Volume 30 Issue 10
Jan.  2011
Turn off MathJax
Article Contents
Xu Shao-Kun, Liu Ji-Hong, Yuan Xiang-Yu, Lu Jing. Two Dimensional Geometric Feature Inversion Method for Midcourse Target Based on ISAR Image[J]. Journal of Electronics & Information Technology, 2015, 37(2): 339-345. doi: 10.11999/JEIT140338
Citation: Liu Wen-Yuan, Tong Feng, Wang Bao-Wen, Wang Ya-Dong. A New Proxy Blind Signature Scheme with Proxy Revocation[J]. Journal of Electronics & Information Technology, 2008, 30(10): 2468-2471. doi: 10.3724/SP.J.1146.2007.00423

A New Proxy Blind Signature Scheme with Proxy Revocation

doi: 10.3724/SP.J.1146.2007.00423
  • Received Date: 2007-03-26
  • Rev Recd Date: 2007-09-14
  • Publish Date: 2008-10-19
  • According to the problems of proxy revocation, original signers forgery and proxy misuse in proxy signature, a secure proxy blind signature scheme with proxy revocation is proposed. In phase of signature, by embedding non-blind time-stamp in the Abe-Okamoto partially blind signature, the original signer can revoke delegation whenever necessary and all valid proxy signatures generated earlier can longer be verified. Besides having the basic properties of the proxy signature, the new scheme prevents proxy misuse, original signers forgery and public key substitution attack.
  • [1] Tan Z, Liu Z, and Tang C. Digital Proxy Blind SignatureSchemes Based on DLP and ECDLP. MM Research Preprints,No.21, MMRC, AMSS, Academia, Sinica, Beijing, 2002,No.21: 212-217. [2] Lu Eric Jui-Lin, HWang Min-Shiang, and Huang Cheng-Jian.A new proxy signature scheme with revocation. AppliedMathematics and Computation, 2005, 161(3): 799-806. [3] 王晓明,张震,符方伟. 一个安全的门限代理签名方案[J].电子与信息学报.2006, 28(7):1308-1311浏览 [4] Abe M and Okamoto T. Provably secure partially blindsignatures. Advances in Cryptology: Crypto 2000, LNCS,Springer-Verlag, 2000: 271-286. [5] Mambo M, Usuda K, and Okamoto E. Proxy signatures:delegation of the power to sign messages. IEICE Trans.Fundamentals, 1996, E79-A(9): 1338-1354. [6] Mambo M, Usuda K, and Okamoto E. Proxy signatures fordelegating signing operation. Proc. 3rd ACM Conference onComputer and Communications Security, New Delhi: ACMPress, 1996: 48-57. [7] Wang S H, Wang G L, and Bao F, et al.. Cryptanalysis of aproxy-protected proxy signature scheme based on ellipticcurve cryptosystem. Vehicular Technology Conference, USA,IEEE 60th 2004: 3240-3243. [8] 李继国,曹珍富,李建中,等. 代理签名的现状与进展. 通信学报,2003, 24(10): 114-124.Li Ji-guo, Cao Zhen-fu, and Li Jian-zhong, et al.. Presentsituation and progress of proxy signature. Journal of ChinaInstitute of Communications, 2003, 24(10): 114-124.
  • Cited by

    Periodical cited type(12)

    1. 于卫刚,徐少坤,吴昌松,袁翔宇. 基于特征提取的ISAR成像欺骗干扰评估方法研究. 航天电子对抗. 2024(03): 16-20 .
    2. 韩立珣,田波,冯存前. 基于MIMO-ISAR的弹道目标结构参数估计方法. 系统工程与电子技术. 2020(03): 603-612 .
    3. 霍超颖,殷红成,邢笑宇,满良. 基于雷达图像特征的空间目标载荷指向估计方法. 电波科学学报. 2019(01): 45-51 .
    4. 鲁逸杰,宫志华,张群,王剑钦,李开明. 基于变分模态分解的进动目标微多普勒特征提取方法. 探测与控制学报. 2019(04): 30-35 .
    5. 任枫轩,王忠勇. 基于ISAR像序列的多旋翼无人机参数估算. 电光与控制. 2018(04): 55-60 .
    6. 王超,叶春茂,文树梁. 低重频宽带雷达中小幅微动目标的周期估计. 系统工程与电子技术. 2018(09): 1945-1952 .
    7. 徐少坤,刘记红,袁翔宇. 基于HRRP序列的中段目标二维几何特征反演方法. 电子与信息学报. 2017(10): 2366-2373 . 本站查看
    8. 刘浩,杨清亮,陈佳东. 近程弹道导弹防御目标识别技术研究. 飞航导弹. 2017(06): 73-77 .
    9. 束长勇,张生俊,黄沛霖,姬金祖. 基于微多普勒估计进动锥体目标特征参数. 系统工程与电子技术. 2017(01): 15-20 .
    10. 王英,束长勇,张生俊,黄沛霖,姬金祖. 快慢时间域间歇采样转发干扰生成进动锥体ISAR群阵列. 电子与信息学报. 2016(02): 450-454 . 本站查看
    11. 周叶剑,张磊,王虹现,邢孟道,牛威. 多站ISAR空间目标姿态估计方法. 电子与信息学报. 2016(12): 3182-3188 . 本站查看
    12. 黄小红,文贡坚. L波段雷达电离层高速运动目标ISAR成像补偿方法. 电子与信息学报. 2015(12): 2971-2976 . 本站查看

    Other cited types(7)

  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3717) PDF downloads(887) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return