The Analysis and Improvement of A Certificateless Threshold Proxy Blind Signature Scheme

被引:0
|
作者
Liu, Er-Gen [1 ]
Zhou, Hua-Jing [2 ]
Zuo, Li-Ming [3 ]
Wang, Xia
机构
[1] East China Univ, Basic Sci Coll, Nanchang, Jiangxi, Peoples R China
[2] East China Jiaotong Univ, Coll Sci, Nanchang, Jiangxi, Peoples R China
[3] East China Jiaotong Univ, Inst Engn & Cryptog, Nanchang, Jiangxi, Peoples R China
关键词
Certificateless; Threshold signature; Proxy signature; Random oracle; Existentially unforgeable;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
From the analysis of a certificateless threshold proxy blind signature scheme proposed by Chen Nan et al(Chen Nan, Zhang Jianzhong. A Certificateless-based Threshold Blind Proxy Blind Signature Scheme [J]. Journal of Xianyang normal university, 2013, 28(6): 4-6.), found that there is a problem of the leaking of original signer's key, this will lead to the abuse of signatures. In order to remedy the defect of the original signer's key be discloused, propose a new scheme, and analysis the security of the new scheme. It is proved that the scheme satisfies blindness, at the same time it is also proved that under the random oracle model the new scheme is existentially unforgeable against the two kinds of attackers.
引用
收藏
页码:494 / 501
页数:8
相关论文
共 50 条
  • [1] Certificateless Proxy Blind Signature Scheme
    Yu Meisheng
    Wu Xiaojuan
    Guan Jian
    Yu Haixia
    [J]. 2009 WRI WORLD CONGRESS ON SOFTWARE ENGINEERING, VOL 2, PROCEEDINGS, 2009, : 177 - 180
  • [2] An Improved Certificateless Proxy Blind Signature Scheme
    Song, Min
    Zhang, Yuegong
    [J]. PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 645 - 649
  • [3] Cryptoanalysis of Certificateless Partially Blind Signature and Proxy Blind Signature Scheme
    Zhang, Jianhong
    Chen, Hua
    Geng, Qin
    [J]. PROCEEDINGS OF THE 2009 2ND INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOLS 1-9, 2009, : 1491 - 1495
  • [4] Analysis and Improvement of Certificateless Partially Blind Signature Scheme
    Liu, E. G.
    Wang, X.
    Zhou, H. J.
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND INFORMATION TECHNOLOGY (SEIT2015), 2016, : 78 - 82
  • [5] Improvement of threshold proxy signature scheme
    Hsu, CL
    Wu, TS
    Wu, TC
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2003, 136 (2-3) : 315 - 321
  • [6] Improvement of threshold proxy signature scheme
    Shao, ZH
    [J]. COMPUTER STANDARDS & INTERFACES, 2004, 27 (01) : 53 - 59
  • [7] Improvement of a threshold proxy signature scheme
    Feng, Chao-Sheng
    Qin, Zhi-Guang
    Yuan, Ding
    [J]. PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 3168 - 3172
  • [8] Structure and analysis of Certificateless Proxy Blind Signature Scheme without Bilinear Pairing
    Wang, Yi
    [J]. RESOURCES AND SUSTAINABLE DEVELOPMENT, PTS 1-4, 2013, 734-737 : 3194 - 3198
  • [9] Certificateless proxy blind signature scheme from bilinear pairings
    Zhang, Bo
    Xu, Qiuliang
    [J]. WKDD: 2009 SECOND INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2009, : 573 - 576
  • [10] Cryptanalysis and Improvement of a Certificateless Multi-proxy Signature Scheme
    Tian, Miaomiao
    Yang, Wei
    Huang, Liusheng
    [J]. FUNDAMENTA INFORMATICAE, 2014, 129 (04) : 365 - 375