ABSTRACT
In a proxy blind signature scheme, the proxy signer is allowed to generate a blind signature on behalf of the original signer. The proxy blind signature scheme is useful in several applications such as e-voting, e-payment and mobile agent environments. This paper analyzed the security shortcoming of a proxy blind signature scheme which is proposed by Tan et al. Comparing with the weakness of the previous schemes, a new proxy blind signature scheme based DLP is presented to overcome the insecurity. It is proved that this scheme is more secure and efficient than the previous schemes. As an instance, the applying of the schemes in electronic voting is describing.
- Chaum D. Blind Signatures for untraceable payments. In 'Crypto '82, New York: Plenum Press, 1983, 199--203.Google Scholar
- Mambo M., Usuda K. Okamoto E. Proxy signatures for delegating signing operation. In Proc. 3rd ACM Conference on Computer and Communications Security, New York: ACM Press, 1996, 48--57. Google ScholarDigital Library
- Yi L. J. Xiao G. Z. Blind proxy signature scheme. In: Chen K. F. Feng D G. Wu L eds. Proceedings of CCICS'2001. Beijing: Science Press, 2001, 88--95(in Chinese)Google Scholar
- Tan Z. Liu Z. Tang C. Digital proxy blind signature schemes based on DLP and ECDLP. In MM Research Preprints, No. 21, MMRC, AMSS, Academia, Beijing, 2002, 212--217.Google Scholar
- Lal S. Awasthi A. K. Proxy Blind Signature Scheme. Journal of Information Science and Engineering. Cryptology ePrint Archive, Report 2003/072. Available at http://eprint.iacr.org/.Google Scholar
- Hung-Min Sun, Bin-Tsan Hsieh On the Security of Some Proxy Blind Signature Schemes. Australasian Information Security Workshop(AISW2004), Dunedin: Australian Computer Society press, 2004, 75--78. Google ScholarDigital Library
- Jung-Yeun L. Jung Hee C. Seungjoo K. An Analysis of Proxy Signatures:Is a Secure Channel Necessary? M. Joye (Ed.): CT-RSA 2003, LNCS 2612, Berlin Heidelberg: Springer-Verlag 2003, 68--79.Google Scholar
Recommendations
DLP Based Proxy Blind Signature Scheme with Low-Computation
NCM '09: Proceedings of the 2009 Fifth International Joint Conference on INC, IMS and IDCProxy blind signature which combines the properties of both proxy signature and blind signature. In a proxy blind signature scheme, the proxy signer is allowed to generate a blind signature on behalf of the original signer. The proxy blind signature ...
Forgeability attack of two DLP-base proxy blind signature schemes
ICSI'11: Proceedings of the Second international conference on Advances in swarm intelligence - Volume Part IIProxy blind signature is a cryptographical technique and allows a proxy signer to produce a proxy blind signature on behalf of original signer, in such a way that the authority learns nothing about the message that is being signed. The unforgeability is ...
Efficienct ID-Based Proxy Blind Signature Schemes from Pairings
CIS '08: Proceedings of the 2008 International Conference on Computational Intelligence and Security - Volume 01In the last couple of years, identity based cryptography has got fruitful achievements. Proxy blind signature scheme enables a proxy signer to make blind signature on behalf of the original signer. This paper proposes an ID-based proxy blind signature ...
Comments