Academia.eduAcademia.edu

Outline

Improved Self-certified Partially Blind Signature Scheme

2012, International journal of computer and communication technology

https://doi.org/10.47893/IJCCT.2012.1130

Abstract

Blind signature allows one user to get a signature without giving the signer any information about the actual message or the resulting signature. In this paper, we aim to improve the recently proposed Lin et al.'s Self-certified Partially Blind Signature Scheme[1] in order to withstand the security flaw in their scheme. The security of the improved scheme is enhanced in the blind signing phase of the scheme. The analysis shows that the proposed scheme resolves security problem in Lin et al.'s scheme and also meets the aspects of security features needed by a partial blind signature.

References (9)

  1. X.Lin, R.Lu H.Zhu, P.Ho and X.Sherman, Provably Secure Self- certified Partially Blind Signature Scheme from Bilinear Pairings,ICC2008,pp. 1530-1535, 2008.
  2. D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing," in Proc. Advances in Cryptology -Crypto'01, LNCS 2139, Springer-Verlag, Santa Barbara, California, USA, pp. 213-229, 2001
  3. D. Chaum, "Security without identification: transaction systems to make big brother obsolete," Communications of the ACM, Vol. 28, No. 10, pp. 1030-1044, 1985.
  4. D.Chaum, Blind signature for untraceable payment, in Advances in Cryptology-Crypto'82, Santa Barbara, California, USA, pp. 199-203, Aug. 1982.
  5. F. Zhang and K. Kim, "Efficient ID-based blind signature and proxy signature from bilinear pairings," in Proc. Australasian conference on Information Security and Pricacy -ACISP 2003, LNCS 2727, Springer-Verlag, Wollongong, Australia, pp. 312-323, 2003.
  6. R. Lu, Z. Cao, and Y. Zhou, "Proxy blind multi-signature schemewithout a secure channel," Applied Mathematics and Computation, Vol. 164, No. 1, pp. 179-187, 2005.
  7. F. Zhang and X. Chen, "Cryptanalysis of Huang-Chang partially blind signature scheme," Journal of Systems and Software, Vol. 76, No. 3, pp. 323-325, 2005.
  8. Sherman S.M. Chow, Lucas C.K. Hui, S.M. Yiu, and K.P. Chow, "Two improved partially blind signature schemes from bilinear pairings," in Proc. Australasian conference on Information Security and Pricacy -ACISP 2005, LNCS 3574, Springer-Verlag, Brisbane, Australia, pp. 316-328, 2005.
  9. S. Goldwasser, S. Micali, and R. Rivest, "A digital signature scheme secure against adaptively chosen message attacks," SIAM Journal on Computing, Vol. 17, No. 2, pp. 281-308, 1988.