Certificateless Proxy Blind Signature Scheme

被引:2
|
作者
Yu Meisheng [1 ]
Wu Xiaojuan [1 ]
Guan Jian [1 ]
Yu Haixia [1 ]
机构
[1] Yanshan Univ, Informat Sci & Engn Inst, Qinhuangdao, Peoples R China
关键词
D O I
10.1109/WCSE.2009.136
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Most of the proxy blind schemes are based on the identity or on certificate In this pope,: a new certificateless proxy blind signature scheme is presented This scheme firstly avoids the inherent escrow of identitybased ciyptography and then doesn't require certificates to guarantee the authenticity of public keys This scheme fulfills the properties of both the proxy signature and the blind signature.
引用
收藏
页码:177 / 180
页数:4
相关论文
共 50 条
  • [21] On the security of a certificateless proxy signature scheme in the standard model
    Zhou, Caixue
    Dong, Xiwei
    Wang, Lihua
    Li, Tao
    [J]. International Journal of Network Security, 2019, 21 (04) : 576 - 581
  • [22] A proxy blind signature scheme with proxy revocation
    Park, Ji-Hye
    Kim, Young-Seol
    Chang, Jik Hyun
    [J]. CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 761 - +
  • [23] New Efficient Certificateless Blind Signature Scheme
    Chen, Haibin
    Zhang, Lei
    Xie, Junyuan
    Wang, Chongjun
    [J]. 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 349 - 353
  • [24] A certificateless restrictive partially blind signature scheme
    Wang, Changji
    Lu, Rongbo
    [J]. 2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 279 - +
  • [25] A Provably Secure Certificateless Blind Signature Scheme
    Yang, Xiaoyuan
    Liang, Zhongyin
    Wei, Ping
    Shen, Junwei
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 643 - 646
  • [26] On constructing certificateless proxy signature from certificateless signature
    Wan Z.-M.
    Lai X.-J.
    Weng J.
    Hong X.
    Long Y.
    Jia W.-W.
    [J]. Journal of Shanghai Jiaotong University (Science), 2008, 13 E (06) : 692 - 694
  • [27] On Constructing Certificateless Proxy Signature from Certificateless Signature
    万中美
    来学嘉
    翁健
    洪璇
    龙宇
    贾巍巍
    [J]. Journal of Shanghai Jiaotong University(Science), 2008, 13 (06) : 692 - 694
  • [28] Security of proxy blind signature scheme
    Zhang, Jianhong
    Cui, Yuanbo
    Chen, Zhipeng
    [J]. Information Technology Journal, 2013, 12 (03) : 466 - 469
  • [29] A new proxy blind signature scheme
    Kai Fan
    Yue Wang
    Hui Li
    [J]. INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2012, 3 (01) : 38 - 42
  • [30] An Improved Proxy Blind Signature Scheme
    Guo, Xi
    Zhang, Jian-Zhong
    Xie, Shu-Cui
    [J]. INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2019, 58 (02) : 354 - 363