A Strong Forward-Secure Proxy Blind Signature Scheme

Article Preview

Abstract:

Combining the mechanism of the hash chain with the forward-secure proxy blind signature, we firstly propose a new strong forward-secure proxy blind signature scheme. This scheme has many secure characters, such as strong forward security, namely, although the attacker get the key in some period , the attacker cannot forge the signature in the past and future periods, verifiability, unforgeability, distinguishability, identifiability, strong blindness.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 457-458)

Pages:

1391-1396

Citation:

Online since:

January 2012

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Y. Desmedt, Y. Frankel. Threshold Cryptosystems. Advances in Cryptology- Crypto'89, 1989: 307–315.

DOI: 10.1007/0-387-34805-0_28

Google Scholar

[2] A. Herzberg, M. Jakobsson, S. Jarecki, H. Krawczyk, and M. Yung. Proactive Public Key and Signature Systems. The Fourth ACM Conference on Computer and Communications Security, 1997: 100–110.

DOI: 10.1145/266420.266442

Google Scholar

[3] R. Anderson. Two Remarks on Public Key Cryptology. Invited Lecture. The Fourth ACM Conference on Computer and Communications Security, (1997).

Google Scholar

[4] M. Abdalla, L. Reyzin. A New Forward-Secure Digital Signature Scheme. Advances in Cryptology-Asiacrypt'00, 2000: 116–129.

DOI: 10.1007/3-540-44448-3_10

Google Scholar

[5] G. Itkis, L. Reyzin. Forward-Secure Signatures with Optimal Signing and Verifying . Advances in Cryptology-Crypto'01, 2001: 332-354.

DOI: 10.1007/3-540-44647-8_20

Google Scholar

[6] B. G. Kang, J. H. Park, S. G. Hahn. A New Forward Secure Signature Scheme. http: /eprint. iacr. org/2004/183.

Google Scholar

[7] M. Burmester, V. Chrissikopoulos, P. Kotzanikolaou and E. Magkos. Strong Forward Security. IFIP International Federation for Information Processing, 2002: 109–121.

DOI: 10.1007/0-306-46998-7_8

Google Scholar

[8] J. Li, H. Pan, Y. Zhu. New Public Key Certificate Revocation Scheme Based on One-Way Hash Chain. Journal of Chinese Computer Systems, 2006, 27(4): 642–645.

Google Scholar