Efficient ID-based blind signature schemes

被引:0
|
作者
Ming, Yang [1 ]
Wang, Yumin [1 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Network, Xian 710071, Shaanxi, Peoples R China
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Blind signature allows the user to obtain a signature of a message in a way that the signer learns neither the message nor the resulting signature. Identity-based public key cryptography can simplify key management procedure compared to certificate-based public key cryptography, so it can be a good alternative for certificate-based public key setting, especially when efficient key management and moderate security are required. In this paper, we propose a new ID-based blind signature scheme from the bilinear pairings. Also we analyze the scheme security and efficient. We show that our new scheme is more efficient than all others proposed so far.
引用
收藏
页码:260 / 264
页数:5
相关论文
共 50 条
  • [41] Highly Efficient ID-based Ring Signature from Pairings
    Chien, Hung-Yu
    2008 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, VOLS 1-3, PROCEEDINGS, 2008, : 829 - 834
  • [42] ID-based authenticated blind signature scheme from bilinear pairings
    Zhao, Zemao
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 725 - 728
  • [43] A NEW ID-BASED PROXY BLIND SIGNATURE SCHEME WITH MESSAGE RECOVERY
    Kong, Tingting
    Xu, Qiuliang
    Wong, Zhiqiang
    3RD INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE (IEEC 2011), PROCEEDINGS, 2011, : 162 - 165
  • [44] Efficient ID-Based Signature Scheme from Bilinear Map
    Sahu, Rajeev Anand
    Padhye, Sahadeo
    ADVANCES IN PARALLEL, DISTRIBUTED COMPUTING, 2011, 203 : 301 - 306
  • [45] ID-based group-oriented proxy signature and blind signature from pairings
    Chen, XF
    Zhang, FG
    CHINESE JOURNAL OF ELECTRONICS, 2006, 15 (01): : 12 - 16
  • [46] An efficient ID-Based proxy signature scheme from pairings
    Gu, Chunxian
    Zhu, Yuefei
    INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 40 - 50
  • [47] Efficient Revocable ID-Based Signature With Cloud Revocation Server
    Jia, Xiaoying
    He, Debiao
    Zeadally, Sherali
    Li, Li
    IEEE ACCESS, 2017, 5 : 2945 - 2954
  • [48] ID-based Signature Under the Schnorr Signature
    He, Zhonghua
    Ge, Lina
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4672 - 4674
  • [49] ID-BASED CRYPTOGRAPHIC SCHEMES FOR USER IDENTIFICATION, DIGITAL SIGNATURE, AND KEY DISTRIBUTION
    HARN, L
    YANG, SB
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1993, 11 (05) : 757 - 760
  • [50] A Secure and Efficient ID-Based Signature Scheme with Revocation for IOT Deployment
    Yang, Xiaodong
    Wang, Jinli
    Ma, Tingchun
    Chen, Chunlin
    Wang, Caifen
    2018 SIXTH INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA (CBD), 2018, : 202 - 207