Secure efficient proxy blind signature schemes based DLP

被引:0
|
作者
Wang, SB [1 ]
Hong, F [1 ]
Cui, GH [1 ]
机构
[1] Huazhong Univ Sci & Technol, Coll Comp, Wuhan, Peoples R China
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In a proxy blind signature scheme, the proxy signer is allowed to generate a blind signature on behalf of the original signer. The proxy blind signature scheme is useful in several applications such as e-voting, e-payment and mobile agent environments. This paper analyzed the security shortcoming of a proxy blind signature scheme which is proposed by Tan et al. Comparing with the weakness of the previous schemes, a new proxy blind signature scheme based Discrete Logarithm Problem (DLP) is presented to overcome the insecurity. It is proved that this scheme is more secure and efficient than the previous schemes. As an instance, the applying of the schemes in electronic voting is describing.
引用
收藏
页码:452 / 455
页数:4
相关论文
共 50 条
  • [1] An efficient proxy blind signature scheme based on DLP
    Yang, Xuan
    Yu, Zhaoping
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2008, : 163 - 166
  • [2] A proxy blind signature schemes based DLP and applying in e-voting
    Wang, Shaobin
    Fan, Hong
    Cui, Guohua
    [J]. Seventh International Conference on Electronic Commerce, Vols 1 and 2, Selected Proceedings, 2005, : 641 - 645
  • [3] A Proxy Blind Signature Scheme Based on DLP
    YU Baozheng
    [J]. Wuhan University Journal of Natural Sciences, 2007, (01) : 83 - 86
  • [4] Efficient Multi-proxy Multi-Signature Schemes Based on DLP
    Chang, Ya-Fen
    Chang, Chin-Chen
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (2B): : 152 - 159
  • [5] Forgeability Attack of Two DLP-Base Proxy Blind Signature Schemes
    Zhang, Jianhong
    Guo, Fenhong
    Sun, Zhibin
    Wang, Jilin
    [J]. ADVANCES IN SWARM INTELLIGENCE, PT II, 2011, 6729 : 395 - +
  • [6] An Efficient ID based Proxy Signature, Proxy Blind Signature and Proxy Partial Blind Signature
    Majhi, Banshidhar
    Sahu, Deepak Kumar
    Subudhi, RamNarayan
    [J]. ICIT 2008: PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, 2008, : 19 - 23
  • [7] Efficient ID-based Proxy Blind Signature Schemes from Pairings
    Pan, Heng
    Ke, Ke
    Gu, Chunxiang
    [J]. 2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 390 - 393
  • [8] An Efficient Scheme based on DLP and RSA for Proxy Group Signature
    Nakum, Bhavesh
    Desai, Urmi
    [J]. 2014 INTERNATIONAL CONFERENCE ON ADVANCES IN ENGINEERING AND TECHNOLOGY RESEARCH (ICAETR), 2014,
  • [9] Secure and Efficient Certificate-Based Proxy Signature Schemes for Industrial Internet of Things
    Qiao, Zirui
    Zhou, Yanwei
    Yang, Bo
    Zhang, Mingwu
    Wang, Tao
    Xia, Zhe
    [J]. IEEE SYSTEMS JOURNAL, 2022, 16 (03): : 4719 - 4730
  • [10] A Secure Proxy Blind Signature Scheme Based on ECDLP
    Hu, Lanlan
    Zheng, Kangfeng
    Hu, Zhengming
    Yang, Yixian
    [J]. MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 454 - 457