Efficient ID-Based Proxy Blind Signature Scheme

被引:2
|
作者
ZHANG Qing1
2. School of Computer
机构
基金
国家自然科学基金重大研究计划;
关键词
proxy signature; blind signature; identity-based; bilinear pairings;
D O I
暂无
中图分类号
TP309 [安全保密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
In a proxy blind signature scheme, the proxy signer is allowed to generate a blind signature on behalf of the original signer. The proxy blind signature scheme is useful in several ap- plications such as e-voting and e-payment. In this paper, we pro- pose an identity-based proxy blind signature scheme which com- bines the advantages of proxy signature and of blind signature. Our scheme fulfills perfectly the security requirements of a proxy blind signature. Comparing the previous scheme, our scheme needs less computational overhead and is more efficient.
引用
收藏
页码:105 / 108
页数:4
相关论文
共 50 条
  • [1] A NEW EFFICIENT ID-BASED PROXY BLIND SIGNATURE SCHEME
    Ming Yang Wang Yumin (State Key Lab of Integrated Service Network
    [J]. Journal of Electronics(China), 2008, (02) : 226 - 231
  • [2] A new efficient ID-based proxy blind signature scheme
    Lang, WM
    Tan, YM
    Yang, ZK
    Liu, G
    Peng, B
    [J]. ISCC2004: NINTH INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2004, : 407 - 411
  • [3] A New ID-Based Proxy Blind Signature Scheme
    LANG Wei-min~1
    2. People’s Liberation Army Institute of Communications Command
    [J]. Wuhan University Journal of Natural Sciences, 2005, (03) : 555 - 558
  • [4] An Efficient ID-based Proxy Ring Signature Scheme
    Wu Lei
    Li Daxing
    [J]. 2009 WRI INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING: CMC 2009, VOL 3, 2009, : 560 - +
  • [5] ID-based proxy blind signature
    Dong, Z
    Zheng, H
    Chen, KF
    Kou, WD
    [J]. 18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, : 380 - 383
  • [6] PROXY BLIND SIGNATURE SCHEME FOR ID-BASED DESIGNATED VERIFIER
    Zhang, Xiaozhi
    Xi, Junfu
    Wang, Zhengqiang
    [J]. 2011 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATIONS AND CONTROL (ICECC), 2011, : 376 - 379
  • [7] An efficient ID-based partially blind signature scheme
    Hu, Xiaoming
    Huang, Shangteng
    [J]. SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 291 - +
  • [8] An efficient ID-Based proxy signature scheme from pairings
    Gu, Chunxian
    Zhu, Yuefei
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 40 - 50
  • [9] A NEW ID-BASED PROXY BLIND SIGNATURE SCHEME WITH MESSAGE RECOVERY
    Kong, Tingting
    Xu, Qiuliang
    Wong, Zhiqiang
    [J]. 3RD INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE (IEEC 2011), PROCEEDINGS, 2011, : 162 - 165
  • [10] Efficient ID-based blind signature and proxy signature from bilinear pairings
    Zhang, FG
    Kim, K
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2003, 2727 : 312 - 323