Paper Title:
Fast Public Key Cryptosystem Based Blind Signature Scheme
  Abstract

Compared with symmetric cryptosystem, asymmetric cryptosystem has much superiority in many application cases. Yet, the computation in a public key cryptosystem is much more complex than symmetric cryptosystem. In the paper, we applied HCC (Hyper-elliptic Curves Cryptosystem) as a typical fast public key cryptosystem into the designing of efficient blind signature scheme and presented an improved blind signature with fast cryptography algorithms. By utilizing probabilistic blinding algorithm, the scheme renders effective protection for the secrecy of original user, the signature generator or outer adversaries can not attack the secret message via the blinded information with effective polynomial algorithms. The scheme avoids the relevance between different signatures and interim parameters from the same original user, thus it effectively prevents signature forgery and replay attack. As security analysis for the scheme, we presented similar blind signature without relevant improving algorithms based on discrete logarithm cryptosystem. The analysis and comparison with other schemes both justify the security, reliability and high efficiency of the improved blind signature scheme regarding software and hardware application environment.

  Info
Periodical
Edited by
Qi Luo
Pages
505-511
DOI
10.4028/www.scientific.net/AMM.20-23.505
Citation
X. W. Zhou, "Fast Public Key Cryptosystem Based Blind Signature Scheme", Applied Mechanics and Materials, Vols. 20-23, pp. 505-511, 2010
Online since
January 2010
Authors
Export
Price
$35.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Jian Hong Zhang, Hua Chen, Yi Xian Yang
Abstract:As a special anonymous signature, the blindness of blind signatures makes it play an important role in electronic commerce. In this paper we...
1265
Authors: Xuan Wu Zhou, Yan Fu
Abstract:Discrete logarithm problem is an important trapdoor function to design asymmetric cryptosystem, and some fast public key cryptosystems have...
1318
Authors: Erl Huei Lu, Henry Ker Chang Chang, Shu Hwang Liaw, Pin Chang Su
Chapter 12: Computer and Information Technologies
Abstract:Recently bilinear pairings have found various applications in cryptosystems. However, a natural open question is to construct a secure and...
3522
Authors: Yi Wang
Chapter 12: Information Technologies, Computer and Data Analysis Applications in Industry and Engineering
Abstract:Combined with certificateless public key cryptography and proxy blind signature, an efficient certificateless proxy blind signature scheme is...
3194