|Table of Contents|

Intrusion-tolerant proxy blind signature scheme based on discrete logarithm


Research Field:
Publishing date:


Intrusion-tolerant proxy blind signature scheme based on discrete logarithm
Liu Fenghua12Mi Junli2Ding Enjie1
1.School of Information and Electrical Engineering,China University of Mining and Technology, Xuzhou 221008,China; 2.School of Mathematics and Physical Science,Xuzhou Institute of Technology,Xuzhou 221111,China
discrete logarithm intrusion tolerance anonymity-revoking identity-based securing private keys proxy blind signature
To defend the forgery attacks of the original signer and signature receiver in the scheme of proxy blind signature,this paper studies the problem of the signature algorithm.Based on the new(t,n)secret sharing mechanism,the private key of the Certificate Authority(CA)is separately stored by using its identity as the mark of private key so that it can provide the intrusion tolerance for the securing Private Keys.Rather than preventing intrusions or attacks to ensure safety of CA,the project ensures that the confidential information of the CA system will not be exposed when a minority of components are attacked.The research results show that even if certain users are spitefully attacked,the system still works properly.


[1] Chaum D,van Heyst E.Group signatures[A].Advan-ces in Cryptology Eurocrypt[C].Berlin:Springer,1991:257-265.
[2]Camenisch J,Stadler M.Efficient group signature schemes for large groups[A].Advances in Cryptology[C].Berlin:Springer,1997:410-424.
[3]Mambo M,Usuda K,Okamoto E.Proxy signature:delegation of the power to sign messages[A].Advances in Cryptology[C].Berlin:Springer,1996:1338-1354.
[4]Bresson E,Stern J.Efficient revocation in group signatures[A].Proceedings of the Public Key Crypto-graphy[C].Cheju Island,Korea:Springer,2001:190-206.
[5]Tan Zuowen,Liu Zhuojun,Tang Chunming.A proxy blind signature scheme based on the discrete logarithm problem[J].Journal of Software,2003,14(11):1931-1935.
[6]Wang Shuhong,Wang Guilin,Bao Feng,et al.Cryptanalysis of a proxy blind signature scheme based on the discrete logarithm problem[J].Journal of Software,2005,16(5):911-915.
Xia Manmin,Gu Lize.A new proxy blind signature scheme[J].Journal of Beijing University of Posts and Telecommunications,2006,29(3):48-52.
Zhang Yingying,Chen Wei,Zeng Jiwen.Analysis and improvement of proxy blind signature scheme based on DLP[J].Application Research of Computers,2013,30(11):3390-3392.
Zhang Youdong,Jiang Bo,Wang Jiandong.Design of network forensic system based on intrusion tolerance[J].Computer Engineering,2007,33(19):161-163.
Xu Chungen,Zhang Aohong,Han Mu,et al.Certificateless proxy signature scheme based on discrete logarithm problem[J].Journal of Nanjing University of Science and Technology,2010,34(6):733-737.
Chai Zhengyi,Bai Hao,Zhang Haojun.An intrusion tolerant protection scheme of CA private key[J].Journal of Computer Applications,2008,28(4):910-911.
He Bin,Du Weizhang.Analysis and improvement of forward secure certificateless proxy blind signature scheme[J].Computer Engineering and Applications,2013,49(22):104-109.
Wu Keli,Zhu Baoping,Wu Bin,et al.Anoymous appraisal protocol[J].Journal of Nanjing University of Science and Technology,2007,31(4):414-417.
Yu Bo,Chen Jianping,Gu Xiang.A practical electronic voting system based on digital signature[J].Computer Engineering & Science,2012,34(5):40-44.
[15]刘方斌,刘凤玉,张宏.基于零知识证明的低能耗Ad Hoc网络匿名路由协议[J].南京理工大学学报,2012,36(5):879-885.
Liu Fangbin,Liu Fengyu,Zhang Hong.Energy efficient anonymous routing protocol for Ad Hoc network based on zero knowledge proofs[J].Journal of Nanjing University of Science and Technology,2012,36(5):879-885.


Last Update: 2015-02-28