计算机应用 ›› 2013, Vol. 33 ›› Issue (02): 447-449.DOI: 10.3724/SP.J.1087.2013.00447

• 信息安全 • 上一篇    下一篇

一种改进的双向盲代理重签名方案

李希合,杨小东   

  1. 西北师范大学 计算机科学与工程学院,兰州 730070
  • 收稿日期:2012-09-03 修回日期:2012-09-13 出版日期:2013-02-01 发布日期:2013-02-25
  • 通讯作者: 李希合
  • 作者简介:李希合(1978-),男,甘肃兰州人,工程师,硕士,主要研究方向:计算机网络安全、分布计算系统;
    杨小东(1981-),男,甘肃甘谷人,副教授,博士,主要研究方向:云计算安全、公钥密码体制。

Improved bidirectional blind proxy re-signature scheme

LI Xihe,YANG Xiaodong   

  1. College of Computer Science and Engineering, Northwest Normal University, Lanzhou Gansu 730070, China
  • Received:2012-09-03 Revised:2012-09-13 Online:2013-02-01 Published:2013-02-25
  • Contact: LI Xihe

摘要: 分析了Deng等(DENG Y Q, DU M H, YOU Z L, et al. A blind proxy re-signatures scheme based on standard model [J]. Journal of Electronics and Information Technology, 2010, 32(5): 1119-1223)提出的双向盲代理重签名方案,发现该方案是不安全的,并给出了一种伪造攻击,受托者不需要与代理者合谋就能成功伪造委托者的签名。为了克服该方案存在的安全缺陷,提出了一个在标准模型下可证安全的双向盲代理重签名方案,可以有效地抵抗这类伪造攻击,并且受托者和代理者都无法获知所签消息的内容,能够更好地保护消息的隐私。分析结果表明,改进的新方案具有盲性、双向性、多用性、透明性和密钥最优性。

关键词: 双向盲代理重签名, 多用性, 盲性, 标准模型, 可证明安全

Abstract: The security of the bidirectional blind proxy re-signature scheme proposed by Deng et al. (DENG Y Q, DU M H, YOU Z L, 〖WTBX〗et al.〖WTBZ〗 A blind proxy re-signatures scheme based on standard model [J]. Journal of Electronics and Information Technology, 2010, 32(5): 1119-1223) was analyzed, and the scheme was found insecure. Meanwhile, a forgery attack on this scheme was given, in which the delegatee could produce the valid signature of the delegator without the help of the proxy. To overcome the weakness of this scheme, an improved blind proxy re-signature scheme was proposed, which was proved secure in the standard model. It can efficiently resist the forgery attack. The delegatee and the proxy can not obtain the contents of the message to be signed in order to better protect the privacy of the message. The proposed scheme is blind, bidirectional, multi-useful, transparent and key optimal.

Key words: bidirectionally blind proxy re-signature, multi-use, blindness, standard model, provable security

中图分类号: