The Design of ID-based Fair Proxy Blind Signature Scheme with Weak Linkability

被引:0
|
作者
Wang, Chih Hung [1 ]
Fan, Jia-Yu [1 ]
机构
[1] Natl Chiayi Univ, Dept Comp Sci & Informat Engn, Chiayi, Taiwan
关键词
blind signature; weak linkability; fairness; proxy blind signature;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The blind signature scheme is a very useful protocol for a requester to obtain a signature on a message from a signer without revealing the linkage of the message content and the signature to the signer. After Chaum's scheme was first proposed in 1982, many extended protocols have been published and already used for many related applications. In 1995, the fair blind signature was first introduced by Stadler et al., in which a property of fairness was added to the ordinary blind signature scheme. The protocol provided an additional trusted third party (TTP) to prevent the abused problems. A variant scheme named the proxy blind signature scheme has been proposed which combined the advantages of the blind signature and the proxy signature. A blind signature can provide the perfect unlinkability for people to protect their privacy. However, it may be more useful for the commercial applications if the blind signature can provide a weak linkability between different message-signature pairs. Certainly, the weakly linkable blind signature must ensure that it can protect personal privacy of the requester. In this paper, we propose an ID-based fair proxy blind signature scheme with weak linkability to help the requester linking some signatures they used, but not leak his personal privacy of identity. Especially, it is the first work to combine the blind signature with the weak linkability, fairness and proxy signing techniques.
引用
收藏
页码:168 / 173
页数:6
相关论文
共 50 条
  • [21] An efficient ID-Based proxy signature scheme from pairings
    Gu, Chunxian
    Zhu, Yuefei
    INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 40 - 50
  • [22] An Enhanced ID-Based Anonymous Proxy Signature Scheme on Pairings
    Hu, Chengyu
    Liu, Pengtao
    2010 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND AUTOMATION ENGINEERING (ICCAE 2010), VOL 4, 2010, : 343 - 346
  • [23] An efficient ID-based partially blind signature scheme
    Hu, Xiaoming
    Huang, Shangteng
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 291 - +
  • [24] An ID-based proxy signature scheme secure against proxy key exposure
    Wen F.
    Cui S.
    Cui J.
    International Journal of Advancements in Computing Technology, 2011, 3 (05) : 108 - 116
  • [25] Efficient ID-based blind signature and proxy signature from bilinear pairings
    Zhang, FG
    Kim, K
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2003, 2727 : 312 - 323
  • [26] New ID-based Proxy Blind Multi-Signature Scheme Without Trusted PKG
    Zhang, Xiaozhi
    Xi, Junfu
    Wang, Dongmei
    2011 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATIONS AND CONTROL (ICECC), 2011, : 352 - 355
  • [27] On the security of an ID-based anonymous proxy signature scheme and its improved scheme
    Zhang, Jianhong
    Mao, Jian
    Xu, Yuwei
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2013, 5 (03) : 181 - 188
  • [28] Efficient ID-based Proxy Blind Signature Schemes from Pairings
    Pan, Heng
    Ke, Ke
    Gu, Chunxiang
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 390 - 393
  • [29] Improvement of an ID-based Proxy Signature Scheme Without Trusted PKG
    Sha, Limin
    2015 16TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2015, : 171 - 174
  • [30] A novel ID-based partial delegation with warrant proxy signature scheme
    Qian, HF
    Cao, ZF
    PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS - ISPA 2005 WORKSHOPS, 2005, 3759 : 323 - 331