ID-based Weak Blind Signature From Bilinear Pairings

نویسنده

  • Ze-mao Zhao
چکیده

In a blind signature scheme, the user can get a signature sig(m) on message m generated from the signer’s blind signature sig(m) on blinded message m, but the signer can’t know the contents of the message m. When the signature sig(m) is revealed to public after that have been signed, if the signer can find the linkage between the signature sig(m) and the blind signature sig(m) on blinded message m, the signature is called as weak blind signature, otherwise, called as strong blind signature. In this paper, by using the bilinear pairings, a new ID-based weak blind signature was proposed, which is based on the Discrete Logarithm Problem and Gap Diffie-Hellman Problem. The proposed scheme use ID-based public key instead of public key of digital certification, can effectively simplify the procedure of public key management and reduce the disk storage space. In addition, by choosing different equations, we gained corresponding weak blind signature schemes respectively. Finally, the security of the proposed scheme was discussed.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

ID-Based Blind Signature and Ring Signature from Pairings

Recently the bilinear pairing such as Weil pairing or Tate pairing on elliptic curves and hyperelliptic curves have been found various applications in cryptography. Several identity-based (simply ID-based) cryptosystems using bilinear pairings of elliptic curves or hyperelliptic curves were presented. Blind signature and ring signature are very useful to provide the user’s anonymity and the sig...

متن کامل

Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings

Blind signature and proxy signature are very important technologies in secure e-commerce. Identity-based (simply ID-based) public key cryptosystem can be a good alternative for certificate-based public key setting, especially when efficient key management and moderate security are required. In this paper, we propose a new ID-based blind signature scheme and an ID-based partial delegation proxy ...

متن کامل

An ID-based Blind Signature Scheme from Bilinear Pairings

Blind signatures, introduced by Chaum, allow a user to obtain a signature on a message without revealing any thing about the message to the signer. Blind signatures play an important role in plenty of applications such as e-voting, e-cash system where anonymity is of great concern. Identity based(ID-based) public key cryptography can be a good alternative for certificate based public key settin...

متن کامل

New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairings

Proxy signatures are very useful tools when one needs to delegate his/her signing capability to other party. After Mambo et al.’s first scheme was announced, many proxy signature schemes and various types of proxy signature schemes have been proposed. Due to the various applications of the bilinear pairings in cryptography, there are many IDbased signature schemes have been proposed. In this pa...

متن کامل

ID-Based Multi-Proxy Signature and Blind Multisignature from Bilinear Pairings

Multi-proxy signature allows the original signer delegate his singing power to a group of proxy signers. Blind proxy-signature allows the user to obtain a signature of a message from several signers in a way that each signer learns neither the message nor the resulting signature. Plenty of multi-proxy signature and blind multisignature schemes have been proposed under the certificate-based (CA-...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • I. J. Network Security

دوره 7  شماره 

صفحات  -

تاریخ انتشار 2008