Advanced Search
Volume 30 Issue 10
Jan.  2011
Turn off MathJax
Article Contents
Liu Wen-Yuan, Tong Feng, Wang Bao-Wen, Wang Ya-Dong. A New Proxy Blind Signature Scheme with Proxy Revocation[J]. Journal of Electronics & Information Technology, 2008, 30(10): 2468-2471. doi: 10.3724/SP.J.1146.2007.00423
Citation: Liu Wen-Yuan, Tong Feng, Wang Bao-Wen, Wang Ya-Dong. A New Proxy Blind Signature Scheme with Proxy Revocation[J]. Journal of Electronics & Information Technology, 2008, 30(10): 2468-2471. doi: 10.3724/SP.J.1146.2007.00423

A New Proxy Blind Signature Scheme with Proxy Revocation

doi: 10.3724/SP.J.1146.2007.00423
  • Received Date: 2007-03-26
  • Rev Recd Date: 2007-09-14
  • Publish Date: 2008-10-19
  • According to the problems of proxy revocation, original signers forgery and proxy misuse in proxy signature, a secure proxy blind signature scheme with proxy revocation is proposed. In phase of signature, by embedding non-blind time-stamp in the Abe-Okamoto partially blind signature, the original signer can revoke delegation whenever necessary and all valid proxy signatures generated earlier can longer be verified. Besides having the basic properties of the proxy signature, the new scheme prevents proxy misuse, original signers forgery and public key substitution attack.
  • loading
  • [1] Tan Z, Liu Z, and Tang C. Digital Proxy Blind SignatureSchemes Based on DLP and ECDLP. MM Research Preprints,No.21, MMRC, AMSS, Academia, Sinica, Beijing, 2002,No.21: 212-217. [2] Lu Eric Jui-Lin, HWang Min-Shiang, and Huang Cheng-Jian.A new proxy signature scheme with revocation. AppliedMathematics and Computation, 2005, 161(3): 799-806. [3] 王晓明,张震,符方伟. 一个安全的门限代理签名方案[J].电子与信息学报.2006, 28(7):1308-1311浏览 [4] Abe M and Okamoto T. Provably secure partially blindsignatures. Advances in Cryptology: Crypto 2000, LNCS,Springer-Verlag, 2000: 271-286. [5] Mambo M, Usuda K, and Okamoto E. Proxy signatures:delegation of the power to sign messages. IEICE Trans.Fundamentals, 1996, E79-A(9): 1338-1354. [6] Mambo M, Usuda K, and Okamoto E. Proxy signatures fordelegating signing operation. Proc. 3rd ACM Conference onComputer and Communications Security, New Delhi: ACMPress, 1996: 48-57. [7] Wang S H, Wang G L, and Bao F, et al.. Cryptanalysis of aproxy-protected proxy signature scheme based on ellipticcurve cryptosystem. Vehicular Technology Conference, USA,IEEE 60th 2004: 3240-3243. [8] 李继国,曹珍富,李建中,等. 代理签名的现状与进展. 通信学报,2003, 24(10): 114-124.Li Ji-guo, Cao Zhen-fu, and Li Jian-zhong, et al.. Presentsituation and progress of proxy signature. Journal of ChinaInstitute of Communications, 2003, 24(10): 114-124.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3690) PDF downloads(887) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return