Paper Title:
A Blind Proxy Re-Signatures Scheme Based on Random Oracle
  Abstract

Digital signature schemes allow a signer to transform any message into a signed message, such that anyone can verify the validity of the signed message using the signer’s public key, but only the signer can generate signed messages. A proxy re-signature, which is a type of digital signatures, has significant applications in many areas. Proxy signature scheme was first introduced by Blaze, Bleumer, and Strauss, but that scheme is inefficient and with limited features. After that, some Proxy re-signature schemes were proposed by researchers. This paper constructs a blind proxy re-signatures scheme. Comparing to the previous proxy re-signature schemes, the scheme adds a message blinded feature, and then the security of the scheme is proven.

  Info
Periodical
Advanced Materials Research (Volumes 204-210)
Edited by
Helen Zhang, Gang Shen and David Jin
Pages
1062-1065
DOI
10.4028/www.scientific.net/AMR.204-210.1062
Citation
Y. Q. Deng, "A Blind Proxy Re-Signatures Scheme Based on Random Oracle", Advanced Materials Research, Vols. 204-210, pp. 1062-1065, 2011
Online since
February 2011
Authors
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Xuan Wu Zhou
Abstract:Compared with symmetric cryptosystem, asymmetric cryptosystem has much superiority in many application cases. Yet, the computation in a...
505
Authors: Jian Hong Zhang, Hua Chen, Yi Xian Yang
Abstract:As a special anonymous signature, the blindness of blind signatures makes it play an important role in electronic commerce. In this paper we...
1265
Authors: Xin De Wang, Jing Liang Zhang, Zheng Tao Jiang
Chapter 3: Material Science, Chemistry and Information Technology
Abstract:A new partially blind signature scheme is proposed based on Schnorr blind signature scheme. Compared with the previous schemes, the proposed...
449
Authors: Erl Huei Lu, Henry Ker Chang Chang, Shu Hwang Liaw, Pin Chang Su
Chapter 12: Computer and Information Technologies
Abstract:Recently bilinear pairings have found various applications in cryptosystems. However, a natural open question is to construct a secure and...
3522
Authors: Yi Wang
Chapter 12: Information Technologies, Computer and Data Analysis Applications in Industry and Engineering
Abstract:Combined with certificateless public key cryptography and proxy blind signature, an efficient certificateless proxy blind signature scheme is...
3194