Efficient ID-based blind signature schemes

被引:0
|
作者
Ming, Yang [1 ]
Wang, Yumin [1 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Network, Xian 710071, Shaanxi, Peoples R China
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Blind signature allows the user to obtain a signature of a message in a way that the signer learns neither the message nor the resulting signature. Identity-based public key cryptography can simplify key management procedure compared to certificate-based public key cryptography, so it can be a good alternative for certificate-based public key setting, especially when efficient key management and moderate security are required. In this paper, we propose a new ID-based blind signature scheme from the bilinear pairings. Also we analyze the scheme security and efficient. We show that our new scheme is more efficient than all others proposed so far.
引用
收藏
页码:260 / 264
页数:5
相关论文
共 50 条
  • [21] An efficient hierarchical ID-Based signature scheme
    Yu, J
    Li, DX
    Hao, R
    Proceedings of the 11th Joint International Computer Conference, 2005, : 92 - 95
  • [22] Efficient ID-based certificateless signature scheme
    Key Laboratory of Computer Network and Information Security, Xidian University, Xi'an 710071, China
    Tongxin Xuebao, 2008, 2 (87-94):
  • [23] Efficient ID-based Designated Verifier Signature
    Blazy, Olivier
    Conchon, Emmanuel
    Germouty, Paul
    Jambert, Amandine
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
  • [24] A New ID-Based Proxy Blind Signature Scheme
    LANG Wei-min~1
    2. People’s Liberation Army Institute of Communications Command
    WuhanUniversityJournalofNaturalSciences, 2005, (03) : 555 - 558
  • [25] New ID-based proxy blind signature scheme
    Lang, Wei-Min
    Yang, Zong-Kai
    Cheng, Wen-Qing
    Tan, Yun-Meng
    Wuhan University Journal of Natural Sciences, 2005, 10 (03) : 555 - 558
  • [26] Towards Efficient ID-based Signature Schemes with Batch Verifications from Bilinear Pairings
    Tseng, Yuh-Min
    Wu, Tsu-Yang
    Wu, Jui-Di
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 935 - 940
  • [27] ID-based blind signature and multi-blind signature from bilinear pairings
    Zhao, Zemao
    Zhu, Longhai
    2007 INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY, PROCEEDINGS, 2007, : 328 - 331
  • [28] An ID-based proxy signature schemes without bilinear pairings
    He Debiao
    Chen Jianhua
    Hu Jin
    annals of telecommunications - annales des télécommunications, 2011, 66 : 657 - 662
  • [29] An ID-based proxy signature schemes without bilinear pairings
    He Debiao
    Chen Jianhua
    Hu Jin
    ANNALS OF TELECOMMUNICATIONS, 2011, 66 (11-12) : 657 - 662
  • [30] ID-based transitive signature schemes without random oracle
    Ma, Xiao-Long
    Gu, Li-Ze
    Cui, Wei
    Yang, Yi-Xian
    Hu, Zheng-Ming
    Tongxin Xuebao/Journal on Communications, 2010, 31 (05): : 37 - 43