The Analysis and Improvement of A Certificateless Threshold Proxy Blind Signature Scheme

被引:0
|
作者
Liu, Er-Gen [1 ]
Zhou, Hua-Jing [2 ]
Zuo, Li-Ming [3 ]
Wang, Xia
机构
[1] East China Univ, Basic Sci Coll, Nanchang, Jiangxi, Peoples R China
[2] East China Jiaotong Univ, Coll Sci, Nanchang, Jiangxi, Peoples R China
[3] East China Jiaotong Univ, Inst Engn & Cryptog, Nanchang, Jiangxi, Peoples R China
关键词
Certificateless; Threshold signature; Proxy signature; Random oracle; Existentially unforgeable;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
From the analysis of a certificateless threshold proxy blind signature scheme proposed by Chen Nan et al(Chen Nan, Zhang Jianzhong. A Certificateless-based Threshold Blind Proxy Blind Signature Scheme [J]. Journal of Xianyang normal university, 2013, 28(6): 4-6.), found that there is a problem of the leaking of original signer's key, this will lead to the abuse of signatures. In order to remedy the defect of the original signer's key be discloused, propose a new scheme, and analysis the security of the new scheme. It is proved that the scheme satisfies blindness, at the same time it is also proved that under the random oracle model the new scheme is existentially unforgeable against the two kinds of attackers.
引用
收藏
页码:494 / 501
页数:8
相关论文
共 50 条
  • [31] Certificateless Proxy Signature Scheme in the Standard Model
    Ming, Yang
    Wang, Yumin
    [J]. FUNDAMENTA INFORMATICAE, 2018, 160 (04) : 409 - 445
  • [32] Security Analysis and Improvement of Pairing-Based Threshold Proxy Signature Scheme
    Wang, Chao
    Hang, Yunpeng
    Li, Fagen
    [J]. 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 64 - +
  • [33] A Certificateless Partially Blind Signature Scheme
    Tang, P. Z.
    Yang, J. F.
    Zhang, Q. L.
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND INFORMATION TECHNOLOGY (SEIT2015), 2016, : 83 - 87
  • [34] Security Analysis and Improvement of Partially Blind Proxy Re-signature Scheme
    Hu, Xiaoming
    Jiang, Wenrong
    Ma, Chuang
    Yu, Chengcheng
    [J]. ICCNS 2018: PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORK SECURITY, 2018, : 12 - 16
  • [35] An improvement of nonrepudiable threshold proxy signature scheme with known signers
    Tzeng, SF
    Hwang, MS
    Yang, CY
    [J]. COMPUTERS & SECURITY, 2004, 23 (02) : 174 - 178
  • [36] Improvement of an Eliptic Curve Based Threshold Proxy Signature Scheme
    Miao, Xiao Yu
    [J]. 2016 INTERNATIONAL CONFERENCE ON ELECTRONIC, INFORMATION AND COMPUTER ENGINEERING, 2016, 44
  • [37] Cryptanalysis and improvement of a ECDLP based proxy blind signature scheme
    Chande, Manoj Kumar
    Lee, Cheng-Chi
    Li, Chun-Ta
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2018, 21 (01): : 23 - 34
  • [38] Analysis and Improvement of a Secure Proxy Signature Scheme
    Hu, Xiaoming
    Xu, Huajie
    Xiong, Xiaohua
    [J]. SECOND INTERNATIONAL CONFERENCE ON FUTURE NETWORKS: ICFN 2010, 2010, : 359 - 362
  • [39] An efficient certificateless proxy signature scheme without pairing
    He, Debiao
    Chen, Yitao
    Chen, Jianhua
    [J]. MATHEMATICAL AND COMPUTER MODELLING, 2013, 57 (9-10) : 2510 - 2518
  • [40] Efficient certificateless proxy signature scheme with provable security
    Seo, Seung-Hyun
    Choi, Kyu Young
    Hwang, Jung Yeon
    Kim, Seungjoo
    [J]. INFORMATION SCIENCES, 2012, 188 : 322 - 337