The Design of ID-based Fair Proxy Blind Signature Scheme with Weak Linkability

被引:0
|
作者
Wang, Chih Hung [1 ]
Fan, Jia-Yu [1 ]
机构
[1] Natl Chiayi Univ, Dept Comp Sci & Informat Engn, Chiayi, Taiwan
关键词
blind signature; weak linkability; fairness; proxy blind signature;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The blind signature scheme is a very useful protocol for a requester to obtain a signature on a message from a signer without revealing the linkage of the message content and the signature to the signer. After Chaum's scheme was first proposed in 1982, many extended protocols have been published and already used for many related applications. In 1995, the fair blind signature was first introduced by Stadler et al., in which a property of fairness was added to the ordinary blind signature scheme. The protocol provided an additional trusted third party (TTP) to prevent the abused problems. A variant scheme named the proxy blind signature scheme has been proposed which combined the advantages of the blind signature and the proxy signature. A blind signature can provide the perfect unlinkability for people to protect their privacy. However, it may be more useful for the commercial applications if the blind signature can provide a weak linkability between different message-signature pairs. Certainly, the weakly linkable blind signature must ensure that it can protect personal privacy of the requester. In this paper, we propose an ID-based fair proxy blind signature scheme with weak linkability to help the requester linking some signatures they used, but not leak his personal privacy of identity. Especially, it is the first work to combine the blind signature with the weak linkability, fairness and proxy signing techniques.
引用
收藏
页码:168 / 173
页数:6
相关论文
共 50 条
  • [41] General secure ID-based proxy signature scheme with multi-delegation
    Tian, Xiu-Xia
    Li, Hong-Jiao
    Wen, Mi
    Wang, Yong
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 710 - 714
  • [42] A Modified ID-Based Proxy Signature Scheme without Key Generation Center
    Liu Er-gen
    Zhou Hua-jing
    Zuo Li-ming
    Wang Xia
    Zhou Hua-jing
    ELECTRICAL AND CONTROL ENGINEERING & MATERIALS SCIENCE AND MANUFACTURING, 2016, : 276 - 281
  • [43] An Efficient Provable Secure ID-Based Proxy Signature Scheme Based on CDH Assumption
    柴震川
    曹珍富
    陆荣幸
    JournalofShanghaiJiaotongUniversity(Science), 2006, (03) : 271 - 278
  • [44] A Provably Secure ID-based Designated Verifier Proxy Signature Scheme Based on DLP
    Wei, Baodian
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4, 2013, 411-414 : 721 - 724
  • [45] An Efficient ID based Proxy Signature, Proxy Blind Signature and Proxy Partial Blind Signature
    Majhi, Banshidhar
    Sahu, Deepak Kumar
    Subudhi, RamNarayan
    ICIT 2008: PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, 2008, : 19 - 23
  • [46] ID-Based Aggregate Proxy Signature Scheme Realizing Warrant-Based Delegation
    Lin, Yen-Ching
    Wu, Tzong-Chen
    Tsai, Jia-Lun
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2013, 29 (03) : 441 - 457
  • [47] ID-based ring signature scheme for collaborative design system
    Wang, Xiao-Feng
    Zhang, Jing
    Wang, Shang-Ping
    Zhang, Ya-Ling
    Zhang, Xiang
    Zhongguo Kuangye Daxue Xuebao/Journal of China University of Mining and Technology, 2007, 36 (03): : 343 - 346
  • [48] A Quantum Proxy Weak Blind Signature Scheme
    Cao, Hai-Jing
    Zhu, Yan-Yan
    Li, Peng-Fei
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2014, 53 (02) : 419 - 425
  • [49] A Quantum Proxy Weak Blind Signature Scheme
    Hai-Jing Cao
    Yan-Yan Zhu
    Peng-Fei Li
    International Journal of Theoretical Physics, 2014, 53 : 419 - 425
  • [50] Provable security of ID-based proxy signature schemes
    Gu, CX
    Zhu, YF
    NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 1277 - 1286