The Design of ID-based Fair Proxy Blind Signature Scheme with Weak Linkability

被引:0
|
作者
Wang, Chih Hung [1 ]
Fan, Jia-Yu [1 ]
机构
[1] Natl Chiayi Univ, Dept Comp Sci & Informat Engn, Chiayi, Taiwan
关键词
blind signature; weak linkability; fairness; proxy blind signature;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The blind signature scheme is a very useful protocol for a requester to obtain a signature on a message from a signer without revealing the linkage of the message content and the signature to the signer. After Chaum's scheme was first proposed in 1982, many extended protocols have been published and already used for many related applications. In 1995, the fair blind signature was first introduced by Stadler et al., in which a property of fairness was added to the ordinary blind signature scheme. The protocol provided an additional trusted third party (TTP) to prevent the abused problems. A variant scheme named the proxy blind signature scheme has been proposed which combined the advantages of the blind signature and the proxy signature. A blind signature can provide the perfect unlinkability for people to protect their privacy. However, it may be more useful for the commercial applications if the blind signature can provide a weak linkability between different message-signature pairs. Certainly, the weakly linkable blind signature must ensure that it can protect personal privacy of the requester. In this paper, we propose an ID-based fair proxy blind signature scheme with weak linkability to help the requester linking some signatures they used, but not leak his personal privacy of identity. Especially, it is the first work to combine the blind signature with the weak linkability, fairness and proxy signing techniques.
引用
收藏
页码:168 / 173
页数:6
相关论文
共 50 条
  • [31] ID-based directed proxy signature scheme from bilinear pairings
    Reddy, P. Vasudeva
    Rao, B. Umaprasada
    Gowri, T.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2010, 13 (05): : 487 - 500
  • [32] An ID-Based Proxy Multi Signature Scheme without Bilinear Pairings
    Tiwari, Namita
    Padhye, Sahadeo
    SECURITY ASPECTS IN INFORMATION TECHNOLOGY, 2011, 7011 : 83 - 92
  • [33] An efficient ID-based restrictive partially blind signature scheme
    Hu, Xiaoming
    Huang, Shangteng
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 205 - +
  • [34] A Security Enforcement ID-based Partially Blind Signature Scheme
    Tian, Xiu-Xia
    Li, Hong-Jiao
    Xu, Jian-Ping
    Wang, Yong
    WISM: 2009 INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND MINING, PROCEEDINGS, 2009, : 488 - 492
  • [35] ID-based group-oriented proxy signature and blind signature from pairings
    Chen, XF
    Zhang, FG
    CHINESE JOURNAL OF ELECTRONICS, 2006, 15 (01): : 12 - 16
  • [36] An improved ID-based restrictive partially blind signature scheme
    Wang, Shangping
    Han, Pei
    Zhang, Yaling
    Wang, Xiaofeng
    PROCEEDINGS OF NINTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING, 2008, : 295 - 300
  • [37] On the security of an efficient ID-based partially blind signature scheme
    Tseng, Yuh-Min
    Wu, Tsu-Yang
    Wu, Jui-Di
    IMECS 2008: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2008, : 417 - 420
  • [38] An ID-Based Designated-Verifier Proxy Multi-Signature Scheme
    Zuo, Weiping
    Liu, Yunfang
    Wang, Sanfu
    2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 576 - 579
  • [39] An efficient ID-based multi-proxy multi-signature scheme
    Guo, Sheng
    Cao, Zhenfu
    Lu, Rongxing
    FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 81 - +
  • [40] ID-based authenticated blind signature scheme from bilinear pairings
    Zhao, Zemao
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 725 - 728