|Table of Contents|

Intrusion-tolerant proxy blind signature scheme based on discrete logarithm

《南京理工大学学报》(自然科学版)[ISSN:1005-9830/CN:32-1397/N]

Issue:
2015年01期
Page:
34-38
Research Field:
Publishing date:

Info

Title:
Intrusion-tolerant proxy blind signature scheme based on discrete logarithm
Author(s):
Liu Fenghua12Mi Junli2Ding Enjie1
1.School of Information and Electrical Engineering,China University of Mining and Technology, Xuzhou 221008,China; 2.School of Mathematics and Physical Science,Xuzhou Institute of Technology,Xuzhou 221111,China
Keywords:
discrete logarithm intrusion tolerance anonymity-revoking identity-based securing private keys proxy blind signature
PACS:
TP309
DOI:
-
Abstract:
To defend the forgery attacks of the original signer and signature receiver in the scheme of proxy blind signature,this paper studies the problem of the signature algorithm.Based on the new(t,n)secret sharing mechanism,the private key of the Certificate Authority(CA)is separately stored by using its identity as the mark of private key so that it can provide the intrusion tolerance for the securing Private Keys.Rather than preventing intrusions or attacks to ensure safety of CA,the project ensures that the confidential information of the CA system will not be exposed when a minority of components are attacked.The research results show that even if certain users are spitefully attacked,the system still works properly.

References:

[1] Chaum D,van Heyst E.Group signatures[A].Advan-ces in Cryptology Eurocrypt[C].Berlin:Springer,1991:257-265.
[2]Camenisch J,Stadler M.Efficient group signature schemes for large groups[A].Advances in Cryptology[C].Berlin:Springer,1997:410-424.
[3]Mambo M,Usuda K,Okamoto E.Proxy signature:delegation of the power to sign messages[A].Advances in Cryptology[C].Berlin:Springer,1996:1338-1354.
[4]Bresson E,Stern J.Efficient revocation in group signatures[A].Proceedings of the Public Key Crypto-graphy[C].Cheju Island,Korea:Springer,2001:190-206.
[5]Tan Zuowen,Liu Zhuojun,Tang Chunming.A proxy blind signature scheme based on the discrete logarithm problem[J].Journal of Software,2003,14(11):1931-1935.
[6]Wang Shuhong,Wang Guilin,Bao Feng,et al.Cryptanalysis of a proxy blind signature scheme based on the discrete logarithm problem[J].Journal of Software,2005,16(5):911-915.
[7]夏满民,谷利泽.一种新型的代理盲签名方案[J].北京邮电大学学报,2006,29(3):48-52.
Xia Manmin,Gu Lize.A new proxy blind signature scheme[J].Journal of Beijing University of Posts and Telecommunications,2006,29(3):48-52.
[8]张瑛瑛,陈玮,曾吉文.对一个基于离散对数代理盲签名方案的分析与改进[J].计算机应用研究,2013,30(11):3390-3392.
Zhang Yingying,Chen Wei,Zeng Jiwen.Analysis and improvement of proxy blind signature scheme based on DLP[J].Application Research of Computers,2013,30(11):3390-3392.
[9]张有东,江波,王建东.基于入侵容忍的网络取证系统设计[J].计算机工程,2007,33(19):161-163.
Zhang Youdong,Jiang Bo,Wang Jiandong.Design of network forensic system based on intrusion tolerance[J].Computer Engineering,2007,33(19):161-163.
[10]许春根,张傲红,韩牟,等.一种基于离散对数问题的无证书代理签名方案[J].南京理工大学学报,2010,34(6):733-737.
Xu Chungen,Zhang Aohong,Han Mu,et al.Certificateless proxy signature scheme based on discrete logarithm problem[J].Journal of Nanjing University of Science and Technology,2010,34(6):733-737.
[11]柴争义,白浩,张浩军.一种CA私钥的容侵保护机制[J].计算机应用,2008,28(4):910-911.
Chai Zhengyi,Bai Hao,Zhang Haojun.An intrusion tolerant protection scheme of CA private key[J].Journal of Computer Applications,2008,28(4):910-911.
[12]何滨,杜伟章.前向安全无证书代理盲签名方案的分析与改进[J].计算机工程与应用,2013,49(22):104-109.
He Bin,Du Weizhang.Analysis and improvement of forward secure certificateless proxy blind signature scheme[J].Computer Engineering and Applications,2013,49(22):104-109.
[13]吴克力,朱保平,吴斌,等.一个匿名评审协议[J].南京理工大学学报,2007,31(4):414-417.
Wu Keli,Zhu Baoping,Wu Bin,et al.Anoymous appraisal protocol[J].Journal of Nanjing University of Science and Technology,2007,31(4):414-417.
[14]俞波,陈建平,顾翔.一种基于数字签名的实用电子投票系统[J].计算机工程与科学,2012,34(5):40-44.
Yu Bo,Chen Jianping,Gu Xiang.A practical electronic voting system based on digital signature[J].Computer Engineering & Science,2012,34(5):40-44.
[15]刘方斌,刘凤玉,张宏.基于零知识证明的低能耗Ad Hoc网络匿名路由协议[J].南京理工大学学报,2012,36(5):879-885.
Liu Fangbin,Liu Fengyu,Zhang Hong.Energy efficient anonymous routing protocol for Ad Hoc network based on zero knowledge proofs[J].Journal of Nanjing University of Science and Technology,2012,36(5):879-885.

Memo

Memo:
-
Last Update: 2015-02-28