计算机应用 ›› 2012, Vol. 32 ›› Issue (11): 3140-3142.DOI: 10.3724/SP.J.1087.2012.03140

• 信息安全 • 上一篇    下一篇

新的无证书的门限代理盲签名方案

王珍1,2,刘培玉3,4,李凤银2   

  1. 1. 山东省分布式计算机软件新技术重点实验室,济南 250014
    2. 山东师范大学 信息科学与工程学院,济南 250014
    3. 山东师范大学 信息科学与工程学院,济南250014
    4. 山东师范大学 山东省分布式计算机软件新技术重点实验室,济南250014
  • 收稿日期:2012-05-18 修回日期:2012-06-29 发布日期:2012-11-12 出版日期:2012-11-01
  • 通讯作者: 王珍
  • 作者简介:王珍(1987-),女,山东即墨人,硕士研究生,CCF会员,主要研究方向:网络信息安全、代理盲签名;刘培玉(1960-),男,山东潍坊人,教授, 博士生导师,主要研究方向:网络信息安全;李凤银(1974-),女,山东定陶人,副教授,博士研究生,主要研究方向:信息安全、数字签名。
  • 基金资助:
    国家自然科学基金资助项目(60873247);国家社会科学基金资助项目(12BXW040);山东省自然科学基金资助项目(ZR2009GZ007,ZR2011FM030)

New certificateless threshold proxy blind signature scheme

WANG Zhen1,2,LIU Pei-yu3,4,LI Feng-yin1   

  1. 1. School of Information Science and Engineering,Shandong Normal University,Jinan Shandong 250014,China
    2. Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology,Jinan Shandong 250014,China
    3. School of Information Science and Engineering, Shandong Normal University, Jinan Shandong 250014, China
    4. Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology, Shandong Normal University, Jinan Shandong 250014, China
  • Received:2012-05-18 Revised:2012-06-29 Online:2012-11-12 Published:2012-11-01
  • Contact: WANG Zhen

摘要: 代理盲签名兼具代理签名和盲签名的优点,同时其具备可扩展性,得到了广泛的关注和研究。针对普通代理盲签名方案中存在代理者权限过大的问题,新方案引入了基于秘密分享思想的门限签名技术,构造了一种新的无证书的门限代理盲签名方案。详细分析了方案的实现过程,分析表明,该方案易于实现,并且能在随机预言下证明其安全性。新方案能够很好的应用在电子投票、电子政务等要求代理签名且需要保护隐私的场合。

关键词: 双线性对, 无证书密码体制, 门限, 代理盲签名, 随机预言机

Abstract: Proxy blind signatures with extended properties are being thought highly of and widely researched in recent years, because they have both the features of proxy signatures and blind signatures. In traditional proxy blind signature, proxy signer’s authority is too big and it will change the original signer’s will. The new scheme introduced threshold signature technology, which based on secret share thoughts, and constructed threshold proxy blind signature with certificateless cryptography. The scheme implementation process with detailed analysis showed that this scheme is easy to realize, and verified its security under the random oracle machine. It can be a good application in electronic voting and e-government affairs where user’s privacy should be protected.

Key words: bilinear pairing, certificateless cryptography, threshold, proxy blind signature, random oracle machine

中图分类号: