Efficient ID-based blind signature schemes

被引:0
|
作者
Ming, Yang [1 ]
Wang, Yumin [1 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Network, Xian 710071, Shaanxi, Peoples R China
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Blind signature allows the user to obtain a signature of a message in a way that the signer learns neither the message nor the resulting signature. Identity-based public key cryptography can simplify key management procedure compared to certificate-based public key cryptography, so it can be a good alternative for certificate-based public key setting, especially when efficient key management and moderate security are required. In this paper, we propose a new ID-based blind signature scheme from the bilinear pairings. Also we analyze the scheme security and efficient. We show that our new scheme is more efficient than all others proposed so far.
引用
收藏
页码:260 / 264
页数:5
相关论文
共 50 条
  • [1] Efficient ID-based Proxy Blind Signature Schemes from Pairings
    Pan, Heng
    Ke, Ke
    Gu, Chunxiang
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 390 - 393
  • [2] New ID-Based Blind Signature Schemes with Message Recovery
    Zheng, Yanbin
    Zhang, Yuting
    2010 INTERNATIONAL CONFERENCE ON INFORMATION, ELECTRONIC AND COMPUTER SCIENCE, VOLS 1-3, 2010, : 2020 - 2023
  • [3] Efficient ID-Based Proxy Blind Signature Scheme
    ZHANG Qing1
    2. School of Computer
    WuhanUniversityJournalofNaturalSciences, 2007, (01) : 105 - 108
  • [4] An efficient ID-based partially blind signature scheme
    Hu, Xiaoming
    Huang, Shangteng
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 291 - +
  • [5] Efficient ID-based (restrictive) partially blind signature
    Cui, Wei
    Xin, Yang
    Hu, Cheng-Yu
    Yang, Yi-Xian
    Li, Zhong-Xian
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2008, 31 (04): : 53 - 57
  • [6] Efficient ID-Based Ring Signature and Ring Signcryption Schemes
    Zhu, Lijun
    Zhang, Futai
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 866 - 870
  • [7] On the Linkability of Two Schnorr Type ID-based Blind Signature Schemes
    Zhang Jianhong
    Chen Hua
    Gao Shengnan
    Geng Qin
    2009 INTERNATIONAL FORUM ON COMPUTER SCIENCE-TECHNOLOGY AND APPLICATIONS, VOL 2, PROCEEDINGS, 2009, : 265 - 269
  • [8] A NEW EFFICIENT ID-BASED PROXY BLIND SIGNATURE SCHEME
    Ming Yang Wang Yumin (State Key Lab of Integrated Service Network
    JournalofElectronics(China), 2008, (02) : 226 - 231
  • [9] An efficient ID-based restrictive partially blind signature scheme
    Hu, Xiaoming
    Huang, Shangteng
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 205 - +
  • [10] On the security of an efficient ID-based partially blind signature scheme
    Tseng, Yuh-Min
    Wu, Tsu-Yang
    Wu, Jui-Di
    IMECS 2008: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2008, : 417 - 420