An improved proxy blind signature scheme based on ECDLP
Downloads
DOI:
https://doi.org/10.26637/mjm203/007Abstract
In a proxy blind signature scheme, there is an integration of the properties as well as advantages of both signature schemes namely proxy signature and blind signature. The concept of this signature scheme with a salient feature that, it allows a designated person say proxy signer to sign on behalf of original signer, in such a way that he/she neither has any idea about the content of the message, nor he/she can make a linkage between the signature and the identity of the requester. Therefore, it is very suitable and easily adoptable for electronic commerce, e-cash applications. Recently, Pradhan and Mohapatra et al.’s claims that their proposed signature scheme satisfies all the properties mandatory for a proxy blind signature scheme. Unfortunately, their scheme fails to fulfil the unlinkability property. To overcome with this weakness, an improved proxy blind signature scheme is presented with the same intractable problem ECDLP. The analysis shows that the new scheme resolves the problem in the former scheme and meets all the aspects of security features needed by proxy blind signature scheme. The analytic results prove that the new scheme is more secure and practicable.
Keywords:
Digital Signature, Discrete Logarithm Problem, Forward Security, Proxy Blind SignatureMathematics Subject Classification:
94A60- Pages: 228-235
- Date Published: 01-07-2014
- Vol. 2 No. 03 (2014): Malaya Journal of Matematik (MJM)
David Chaum, Blind signature for untraceable payments, Advances in Cryptology, proceeding of CRYPTO’82, Springer-Verlag, New York, 199–203, 1983. DOI: https://doi.org/10.1007/978-1-4757-0602-4_18
M. Mambo, K. Usuda, E. Okamoto, Proxy signatures: delegation of the power to sign message, IEICE Transactions on Fundamentals, E79-A(9)(1996), 1338–1354.
M. Mambo, K. Usuda, and E. Okamoto, Proxy signatures for delegating signing operation, In: Proceeding of 3rd ACM Conference on Computer and Communications Security (CCS’96), 48–57, ACM Press, (1996). DOI: https://doi.org/10.1145/238168.238185
W. D. Lin and J.K. Jan, A security personal learning tools using a proxy blind signature scheme, Proceedings of International Conference on Chinese Language Computing, Illinois, USA, July 2000, 273–277.
Z. Tan, Z. Liu, C. Tang, Digital proxy blind signature schemes based on DLP and ECDLP, MM Research Preprints, MMRC, AMSS, Academia, Sinica, Beijing, 21, 212–217, (2002).
A.K. Awasthi and S. Lal, Proxy blind signature scheme, Journal of Information Science and Engineering, 2003, Cryptology ePrint Archive, Report 2003/072.
H. Y. Wang and R. C. Wang, A proxy blind signature scheme based on ECDLP, Chinese Journal of Electronics, 14(2)(2005), 281–284.
X. Yang and Z. Yu, Security Analysis of a proxy blind signature scheme based on ECDLP, in Proceeding of 4 th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM’08), Oct. 2008, 1–4. DOI: https://doi.org/10.1109/WiCom.2008.1132
S. Pradhan and R. K. Mohapatra, Proxy blind signature scheme based on ECDLP, International Journal of Engineering Science & Technology, 3(3)(2011), 2244–2248.
N. Koblitz, Elliptic Curve Cryptosystems, Math. Comp., 48(1987), 203–209. DOI: https://doi.org/10.1090/S0025-5718-1987-0866109-5
V. S. Miller, Use of elliptic curves in cryptography. In Advances in Cryptology-CRYPTO’85, Santa Barbara, CA, 1985, Lecture Notes in Computer Science, 218, Springer-Verlag, Berlin, 417–426, 1986. DOI: https://doi.org/10.1007/3-540-39799-X_31
R.L. Rivest, A. Shamir and L.M. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM (2)(21)(1978), 120–126. DOI: https://doi.org/10.1145/359340.359342
T. ElGamal, A public-key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transactions on Information Theory, 31(1985), 469–472. DOI: https://doi.org/10.1109/TIT.1985.1057074
A. Lenstra, E. Verhuel, Selecting cryptographic key sizes, Journal of Cryptography, 14(2001), 255–293. DOI: https://doi.org/10.1007/s00145-001-0009-4
- NA
Similar Articles
- Janusz Wlodarczyk, Djilali Behloul, Sui Sun Cheng, Conversion of number systems and factorization , Malaya Journal of Matematik: Vol. 2 No. 03 (2014): Malaya Journal of Matematik (MJM)
You may also start an advanced similarity search for this article.
Metrics
Published
How to Cite
Issue
Section
License
Copyright (c) 2014 MJM
This work is licensed under a Creative Commons Attribution 4.0 International License.