Paper Title:
Blind Signature Based on Discrete Logarithm Type Cryptosystem
  Abstract

Discrete logarithm problem is an important trapdoor function to design asymmetric cryptosystem, and some fast public key cryptosystems have been designed based on it. In the paper, we introduced fast asymmetric cryptosystem into the designing and analyzing of blind signature, and presented improved blind signature schemes based on ECC (Elliptic Curves Cryptosystem). The trapdoor function of the blind signatures is based on ECDLP (Elliptic Curves Discrete Logarithm Problem), and the algorithms of the scheme make full use of the superiority of ECC, such as high efficiency and short key length. The improved blind signature schemes can achieve the same security level with less storing space, smaller communication band-width and less overheads regarding software and hardware application. Furthermore, the algorithms in the schemes can be generalized into other public key cryptosystems based on discrete logarithm problem without any influence to efficiency or security.

  Info
Periodical
Advanced Materials Research (Volumes 204-210)
Edited by
Helen Zhang, Gang Shen and David Jin
Pages
1318-1321
DOI
10.4028/www.scientific.net/AMR.204-210.1318
Citation
X. W. Zhou, Y. Fu, "Blind Signature Based on Discrete Logarithm Type Cryptosystem", Advanced Materials Research, Vols. 204-210, pp. 1318-1321, 2011
Online since
February 2011
Authors
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Xuan Wu Zhou
Abstract:Compared with symmetric cryptosystem, asymmetric cryptosystem has much superiority in many application cases. Yet, the computation in a...
505
Authors: Jian Hong Zhang, Hua Chen, Yi Xian Yang
Abstract:As a special anonymous signature, the blindness of blind signatures makes it play an important role in electronic commerce. In this paper we...
1265
Authors: Xin De Wang, Jing Liang Zhang, Zheng Tao Jiang
Chapter 3: Material Science, Chemistry and Information Technology
Abstract:A new partially blind signature scheme is proposed based on Schnorr blind signature scheme. Compared with the previous schemes, the proposed...
449
Authors: Erl Huei Lu, Henry Ker Chang Chang, Shu Hwang Liaw, Pin Chang Su
Chapter 12: Computer and Information Technologies
Abstract:Recently bilinear pairings have found various applications in cryptosystems. However, a natural open question is to construct a secure and...
3522
Authors: Yi Wang
Chapter 12: Information Technologies, Computer and Data Analysis Applications in Industry and Engineering
Abstract:Combined with certificateless public key cryptography and proxy blind signature, an efficient certificateless proxy blind signature scheme is...
3194