skip to main content
10.1145/1089551.1089666acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicecConference Proceedingsconference-collections
Article

A proxy blind signature schemes based DLP and applying in e-voting

Authors Info & Claims
Published:15 August 2005Publication History

ABSTRACT

In a proxy blind signature scheme, the proxy signer is allowed to generate a blind signature on behalf of the original signer. The proxy blind signature scheme is useful in several applications such as e-voting, e-payment and mobile agent environments. This paper analyzed the security shortcoming of a proxy blind signature scheme which is proposed by Tan et al. Comparing with the weakness of the previous schemes, a new proxy blind signature scheme based DLP is presented to overcome the insecurity. It is proved that this scheme is more secure and efficient than the previous schemes. As an instance, the applying of the schemes in electronic voting is describing.

References

  1. Chaum D. Blind Signatures for untraceable payments. In 'Crypto '82, New York: Plenum Press, 1983, 199--203.Google ScholarGoogle Scholar
  2. Mambo M., Usuda K. Okamoto E. Proxy signatures for delegating signing operation. In Proc. 3rd ACM Conference on Computer and Communications Security, New York: ACM Press, 1996, 48--57. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Yi L. J. Xiao G. Z. Blind proxy signature scheme. In: Chen K. F. Feng D G. Wu L eds. Proceedings of CCICS'2001. Beijing: Science Press, 2001, 88--95(in Chinese)Google ScholarGoogle Scholar
  4. Tan Z. Liu Z. Tang C. Digital proxy blind signature schemes based on DLP and ECDLP. In MM Research Preprints, No. 21, MMRC, AMSS, Academia, Beijing, 2002, 212--217.Google ScholarGoogle Scholar
  5. Lal S. Awasthi A. K. Proxy Blind Signature Scheme. Journal of Information Science and Engineering. Cryptology ePrint Archive, Report 2003/072. Available at http://eprint.iacr.org/.Google ScholarGoogle Scholar
  6. Hung-Min Sun, Bin-Tsan Hsieh On the Security of Some Proxy Blind Signature Schemes. Australasian Information Security Workshop(AISW2004), Dunedin: Australian Computer Society press, 2004, 75--78. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Jung-Yeun L. Jung Hee C. Seungjoo K. An Analysis of Proxy Signatures:Is a Secure Channel Necessary? M. Joye (Ed.): CT-RSA 2003, LNCS 2612, Berlin Heidelberg: Springer-Verlag 2003, 68--79.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ICEC '05: Proceedings of the 7th international conference on Electronic commerce
    August 2005
    957 pages
    ISBN:1595931120
    DOI:10.1145/1089551
    • Conference Chairs:
    • Qi Li,
    • Ting-Peng Liang

    Copyright © 2005 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 15 August 2005

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • Article

    Acceptance Rates

    Overall Acceptance Rate150of244submissions,61%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader