Structure and Analysis of Certificateless Proxy Blind Signature Scheme without Bilinear Pairing

Article Preview

Abstract:

Combined with certificateless public key cryptography and proxy blind signature, an efficient certificateless proxy blind signature scheme is proposed. Its security is based on the discrete logarithm problem. Compared with the existed certificateless proxy blind signature scheme, because without bilinear pairing, it have higher efficiency. According to the different attacker and all kinds of attacks, the scheme is proved to be correct and security under the hardness of discrete logarithm problem in the finite field.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 734-737)

Pages:

3194-3198

Citation:

Online since:

August 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Chaum D Blind signature for untraceable payments[A] Chaum D, Rivest R L, Shepman A T. Advances in Cryptology: Crypto1982 [C]. New York: Plemum, 1982:199-203.

DOI: 10.1007/978-1-4757-0602-4_18

Google Scholar

[2] LIN W D, JAN J K. A security personal learning tools using a proxy blind signature scheme [C] //Proc of International Conferece on Chinese Language Computing. Washington DC: IEEE Computer Society, 2000: 273-277.

Google Scholar

[3] Al-Riyami S, Paterson K. Certificateless public key cryptography [C] //LNCS 2894: Asiacrypt 2003, 2003: 452-473.

DOI: 10.1007/978-3-540-40061-5_29

Google Scholar

[4] Chen Hu, Song Rushun. Certificateless proxy signature and proxy blind signature scheme [J]. Computer Engineering and Applications, 2009, 45(9): 92-97.

DOI: 10.3724/sp.j.1087.2010.03341

Google Scholar

[5] Wei Chunyan, Cai Xiaoqiu. New certificateless proxy blind signature [J]. Computer Applications, 2010, 30(12): 3343-3345.

DOI: 10.3724/sp.j.1087.2010.03341

Google Scholar

[6] Zhang Jianz , Peng Lih , Xue Rongh . A certificateless proxy blind signature [J]. Computer Engineering, 2011, 7(14):112-117.

Google Scholar

[7] Liu Juxia, Su Jingf. The proxy blind signature scheme based on discrete logarithm [J]. Computer Engineering and Applications, 2010, 46(25): 94-96.

Google Scholar

[8] Xu Chung, Zhang Aoh. Proxy signature scheme based on discrete logarithm problem of certificateless [J]. Nanjing University of Technology (Natural Science), 2010, 34(6): 733-737.

Google Scholar

[9] Wang Huig, Wang Caif, Cao Hao, Cheng Jieh. Certificateless signature scheme based on discrete logarithm[J]. Computer Engineering and Design, 2011,32(10): 3284-3286.

Google Scholar

[10] Wan Li, Li Fangw, Yan Shaoj. Analysis and Improvement of a proxy blind signature scheme [J]. Computer Applications, 2011,31(4):989-991.

DOI: 10.3724/sp.j.1087.2011.00989

Google Scholar