Provably secure proxy blind signature scheme

被引:0
|
作者
Kim, Young-Seol [1 ]
Chang, Jik-Hyun [1 ]
机构
[1] Sogang Univ, Dept Comp Sci & Engn, Mapo Gu, 1 Sinsu Dong, Seoul 121742, South Korea
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A proxy blind signature scheme is a digital signature scheme which combines the properties of a proxy signature and a blind signature scheme. Recently, Guilin Wang proposed a provably secure proxy signature scheme, which is based on a two-party Schnorr signature scheme. In this paper, on the basis of Guilin Wang's proxy signature scheme and the Okamoto-Schnorr blind signature, we propose a provably secure proxy blind signature scheme against adaptive chosen message attack on random oracle model. And proposed scheme satisfies the security properties of both the blind signature and the proxy signature scheme.
引用
收藏
页码:998 / +
页数:3
相关论文
共 50 条
  • [31] A Provably Secure Proxy Signature Scheme with Multiple Threshold Values Based on Elliptic Curve
    Shao, Zuhua
    [J]. PROCEEDINGS OF 2009 INTERNATIONAL WORKSHOP ON INFORMATION SECURITY AND APPLICATION, 2009, : 58 - 61
  • [32] Proxy blind multi-signature scheme without a secure channel
    Lu, RX
    Cao, ZF
    Zhou, Y
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 164 (01) : 179 - 187
  • [33] Provably secure certificateless digital signature scheme
    Wang, Hua-Qun
    [J]. Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2010, 36 (SUPPL. 2): : 76 - 78
  • [34] Provably Secure Convertible Nominative Signature Scheme
    Zhao, Wei
    Lin, Changlu
    Ye, Dingfeng
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, 2009, 5487 : 23 - 40
  • [35] A new provably secure certificateless signature scheme
    Zhang, Lei
    Zhang, Futai
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 1685 - 1689
  • [36] Provably Secure Server-Assisted Verification Threshold Proxy Re-signature Scheme
    Lv, Guoning
    Lei, Yanfang
    Hu, Mingsheng
    Cheng, Yage
    Gong, Bei
    Fu, Junjun
    [J]. TRUSTED COMPUTING AND INFORMATION SECURITY, CTCIS 2019, 2020, 1149 : 44 - 57
  • [37] A Provably Secure Certificateless Proxy Signature Scheme Against Malicious-But-Passive KGC Attacks
    Yang, Wenjie
    Weng, Jian
    Huang, Xinyi
    Yang, Anjia
    [J]. COMPUTER JOURNAL, 2020, 63 (08): : 1139 - 1147
  • [38] A Provably Secure ID-based Designated Verifier Proxy Signature Scheme Based on DLP
    Wei, Baodian
    [J]. INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4, 2013, 411-414 : 721 - 724
  • [39] A proxy blind signature scheme with proxy revocation
    Park, Ji-Hye
    Kim, Young-Seol
    Chang, Jik Hyun
    [J]. CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 761 - +
  • [40] Secure threshold proxy signature scheme
    Department of Computer Science, Jinan University, Guangzhou 510632, China
    不详
    [J]. Dianzi Yu Xinxi Xuebao, 2006, 7 (1308-1311):