|
计算机应用 2006
ID-based blind signature and proxy signature without a trusted party
|
Abstract:
The current ID-based blind signatures and proxy signatures were analyzed in this paper. It was found that these systems need to trust a Private Key Generator (PKG) unconditionally. Because PKG can compute the private key of any user in system, it can forge a blind signature or a proxy signature of any one. Based on the current ID-based signature and ID-based blind signature, a new ID-based blind signature without trusted PKG was proposed. Meanwhile, a new ID-based proxy signature without trusted PKG was also proposed. The analysis shows that our proposed blind signature and proxy signature are secure and effective.