Paper Title:
Efficient Blind Signature Scheme Based on Modified Generalized Bilinear Inversion
  Abstract

As a special anonymous signature, the blindness of blind signatures makes it play an important role in electronic commerce. In this paper we first propose a novel blind signature scheme from bilinear pairings. Furthermore, we also give a formal proof of security for the proposed schemes in the random oracle model. And we show that the scheme satisfies the two properties of blind signature: blindness and unforgeability. As for efficiency of the scheme, the size of our blind signature is 320 bits, and no pairings operator are required in the blind signing phas and two pairing operators are needed I the verification phase.

  Info
Periodical
Key Engineering Materials (Volumes 439-440)
Edited by
Yanwen Wu
Pages
1265-1270
DOI
10.4028/www.scientific.net/KEM.439-440.1265
Citation
J. H. Zhang, H. Chen, Y. X. Yang, "Efficient Blind Signature Scheme Based on Modified Generalized Bilinear Inversion ", Key Engineering Materials, Vols. 439-440, pp. 1265-1270, 2010
Online since
June 2010
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Da Jian Liao, Yuan Sheng Tang
Abstract:In a designated verifier proxy signature scheme, one can delegate his or her signing capability to another user in such a way that the latter...
753
Authors: Jian Hong Zhang, Min Xu, Xiu Na Su
Abstract:As a concept of delegating signing rights for digital signatures, proxy signature is a well studied subject in cryptography. Proxy signature...
876
Authors: Bao Yuan Kang
Chapter 1: Mechatronics
Abstract:A verifiably encrypted signature scheme involves a signer, a verifier, and an adjudicator. It can convince a verifier that a given ciphertext...
914
Authors: Hong Zhen Du, Mei Juan Huang
Chapter 18: Computer Applications in Industry and Engineering
Abstract:We construct an efficient and novel identity-based strong designated verifier signature (IBSDVS) scheme based on bilinear pairings, and...
2870
Authors: Erl Huei Lu, Henry Ker Chang Chang, Shu Hwang Liaw, Pin Chang Su
Chapter 12: Computer and Information Technologies
Abstract:Recently bilinear pairings have found various applications in cryptosystems. However, a natural open question is to construct a secure and...
3522