DOI QR코드

DOI QR Code

대리 은닉서명 에이전트의 설계를 위한 최적화 알고리즘

An Optimal Algorithm for the Design of a Proxy Blind Signature Agent

  • 이현숙 (동양미래대학교 전산정보학부)
  • Rhee, Hyunsook (School of Computing & Information, Dongyang Mirae University)
  • 투고 : 2013.06.04
  • 심사 : 2013.07.10
  • 발행 : 2013.07.31

초록

본 논문에서는G. Wang의 대리서명 방식과 Schnorr 은닉서명 방식을 이용하여 안전한 대리은닉서명방식을 제안한다. 대리은닉 서명은 대리서명과 은닉서명을 결합한 전자서명 방식이다. G. Wang은 두-참가자 Schnorr 서명방식에 기반한 안전성 증명 가능한 대리서명 방식을 제안하였다. 이 논문에서는, G. Wang의 대리서명 방식과 또한, 제안하는 대리 은닉 서명 방식을 이용하여 전자 투표를 위한 대리 에이전트를 고안한다. 그리고, 제안하는 서명 방식이 대리 서명과 은닉 서명의 안전성 요구사항을 모두 만족시키며 최적화된 효율적인 대리 은닉 서명 방식임을 보인다.

In this paper, on the basis of Guilin Wang's proxy signature scheme and the Schnorr blind signature, we propose a secure proxy blind signature scheme. A proxy blind signature scheme is a digital signature scheme which combines the properties of a proxy signature and a blind signature scheme. Guilin Wang proposed a provably secure proxy signature scheme, which is based on a two-party Schnorr signature scheme. Also, using the proposed proxy blind signature scheme, we propose the proxy agent system for the electronic voting. We show the proposed scheme satisfies the security properties of both the blind signature and the proxy signature scheme and is efficient and optimal proxy blind signature scheme.

키워드

참고문헌

  1. M. Mambo, K. Usuda, and E. Okamoto. "Proxy signatures: Delegation of the power to sign messages", IEICE Trans. Fundamentals, Vol. E79-A, No. 9, pp. 1338-1353, Sep 1996.
  2. M. Mambo, K. Usuda, and E. Okamoto. "Proxy signatures for delegating signing operation", 3rd ACM Conference on Computer and Communications Security (CCS'96), New York: ACM Press, pp. 48-57, 1996.
  3. D. Chaum. Blind signatures for untraceable payments. In Crypto'82, New York: Plenum Press, pp. 199-203, 1983.
  4. Z. Tan, Z. Liu, C. Tang. Digital Proxy Blind Signature Schemes Based on DLP and ECDLP. In: MM Research Preprints, No. 21, MMRC, AMMS, Academia Sinica, Beijing, pp. 212-217, 2002.
  5. G. Wang. Designated-Verifier Proxy Signature Schemes. In: Security and Privacy in the Age of Ubiquitous Computing (IFIP/ SEC 2005), Springer, pp. 409-423, 2005.
  6. C.P. Schnorr. Security of blind discrete log signatures against interactive attacks. In: Information and Communications Security (ICICS 2001), LNCS 2229, Springer-Verlag, pp. 1-12, 2001.
  7. S. Lal, A. K. Awasthi. Proxy Blind Signature Scheme. In: Journal of Information Science and Engineering. Cryptology ePrint Archive, Report 2003/072, http://eprint.iacr.org/
  8. J Liu, J Liu, X Qiu, A proxy blind signature scheme and an off-line electronic cash scheme. Wuhan University Journal of Natural Sciences. Vol. 18. No. 2, pp. 109-116. 2013. https://doi.org/10.1007/s11859-013-0902-3
  9. X Wen, Y Chen, J Fang, An inter-bank E-payment protocol based on quantum proxy blind signature. Quantum information processing, pp. 549-558, 2013.
  10. S Panda, R Kumar Mohapatra, Stamped Proxy Blind Signature Scheme, International Journal of Computer Applications, vol. 64, issue 15, pp. 38-41, 2013.
  11. J Shi, R Shi, X Peng, MH Lee, Quantum communication scheme for blind signature with arbitrary two-particle entangled system, Advanced Communication Technology (ICACT), 2013 15th International Conference, pp. 58-62, Jan. 2013.