An improved proxy blind signature scheme based on ECDLP

Downloads

DOI:

https://doi.org/10.26637/mjm203/007

Abstract

In a proxy blind signature scheme, there is an integration of the properties as well as advantages of both signature schemes namely proxy signature and blind signature. The concept of this signature scheme with a salient feature that, it allows a designated person say proxy signer to sign on behalf of original signer, in such a way that he/she neither has any idea about the content of the message, nor he/she can make a linkage between the signature and the identity of the requester. Therefore, it is very suitable and easily adoptable for electronic commerce, e-cash applications. Recently, Pradhan and Mohapatra et al.’s claims that their proposed signature scheme satisfies all the properties mandatory for a proxy blind signature scheme. Unfortunately, their scheme fails to fulfil the unlinkability property. To overcome with this weakness, an improved proxy blind signature scheme is presented with the same intractable problem ECDLP. The analysis shows that the new scheme resolves the problem in the former scheme and meets all the aspects of security features needed by proxy blind signature scheme. The analytic results prove that the new scheme is more secure and practicable.

Keywords:

Digital Signature, Discrete Logarithm Problem, Forward Security, Proxy Blind Signature

Mathematics Subject Classification:

94A60
  • Manoj Kumar Chande Shri Shankaracharya Institute Of Professional Management & Technology, Raipur, 492015, Chhattisgarh, India.
  • Pages: 228-235
  • Date Published: 01-07-2014
  • Vol. 2 No. 03 (2014): Malaya Journal of Matematik (MJM)

David Chaum, Blind signature for untraceable payments, Advances in Cryptology, proceeding of CRYPTO’82, Springer-Verlag, New York, 199–203, 1983. DOI: https://doi.org/10.1007/978-1-4757-0602-4_18

M. Mambo, K. Usuda, E. Okamoto, Proxy signatures: delegation of the power to sign message, IEICE Transactions on Fundamentals, E79-A(9)(1996), 1338–1354.

M. Mambo, K. Usuda, and E. Okamoto, Proxy signatures for delegating signing operation, In: Proceeding of 3rd ACM Conference on Computer and Communications Security (CCS’96), 48–57, ACM Press, (1996). DOI: https://doi.org/10.1145/238168.238185

W. D. Lin and J.K. Jan, A security personal learning tools using a proxy blind signature scheme, Proceedings of International Conference on Chinese Language Computing, Illinois, USA, July 2000, 273–277.

Z. Tan, Z. Liu, C. Tang, Digital proxy blind signature schemes based on DLP and ECDLP, MM Research Preprints, MMRC, AMSS, Academia, Sinica, Beijing, 21, 212–217, (2002).

A.K. Awasthi and S. Lal, Proxy blind signature scheme, Journal of Information Science and Engineering, 2003, Cryptology ePrint Archive, Report 2003/072.

H. Y. Wang and R. C. Wang, A proxy blind signature scheme based on ECDLP, Chinese Journal of Electronics, 14(2)(2005), 281–284.

X. Yang and Z. Yu, Security Analysis of a proxy blind signature scheme based on ECDLP, in Proceeding of 4 th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM’08), Oct. 2008, 1–4. DOI: https://doi.org/10.1109/WiCom.2008.1132

S. Pradhan and R. K. Mohapatra, Proxy blind signature scheme based on ECDLP, International Journal of Engineering Science & Technology, 3(3)(2011), 2244–2248.

N. Koblitz, Elliptic Curve Cryptosystems, Math. Comp., 48(1987), 203–209. DOI: https://doi.org/10.1090/S0025-5718-1987-0866109-5

V. S. Miller, Use of elliptic curves in cryptography. In Advances in Cryptology-CRYPTO’85, Santa Barbara, CA, 1985, Lecture Notes in Computer Science, 218, Springer-Verlag, Berlin, 417–426, 1986. DOI: https://doi.org/10.1007/3-540-39799-X_31

R.L. Rivest, A. Shamir and L.M. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM (2)(21)(1978), 120–126. DOI: https://doi.org/10.1145/359340.359342

T. ElGamal, A public-key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transactions on Information Theory, 31(1985), 469–472. DOI: https://doi.org/10.1109/TIT.1985.1057074

A. Lenstra, E. Verhuel, Selecting cryptographic key sizes, Journal of Cryptography, 14(2001), 255–293. DOI: https://doi.org/10.1007/s00145-001-0009-4

  • NA

Metrics

Metrics Loading ...

Published

01-07-2014

How to Cite

Manoj Kumar Chande. “An Improved Proxy Blind Signature Scheme Based on ECDLP”. Malaya Journal of Matematik, vol. 2, no. 03, July 2014, pp. 228-35, doi:10.26637/mjm203/007.