Application of Identity-Based Blind Signature in the Performance Evaluation

Article Preview

Abstract:

This paper describes identity-based digital signature. On this basis, we introduce blind digital signature to propose a new identity-based blind digital signature scheme and analyze the performance between this new scheme and a previous one. Then we discuss the application of identity-based blind digital signature in the performance evaluation and design an online performance evaluation scheme.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 846-847)

Pages:

1652-1655

Citation:

Online since:

November 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Boneh D, Franklin M. Identity-based encryption from the Weil pairing[C]/Advances in Cryptology—CRYPTO 2001. Springer Berlin Heidelberg, 2001: 213-229.

DOI: 10.1007/3-540-44647-8_13

Google Scholar

[2] D. Chaum. Blind Signature Systems. Advances in Cryptology-Crypto'83, pp.153-158, New York: Plenum Press, (1983).

Google Scholar

[3] IEEE 1360-2000, Standard Specifications for Public-Key Cryptography, Available at: http: /www. ieee. org/grouper/1363.

Google Scholar

[4] Cha J C, Cheon J H. An Identity-based Signature from Gap Diffie-Hellman Groups[C]/Proc. of PKC'03. Berlin, Germany: Springer-Verlag, 2003: 18-30.

DOI: 10.1007/3-540-36288-6_2

Google Scholar

[5] Zhang Fangguo, Kim K. Efficient ID-based Blind Signature and Proxy Signature from Bilinear Pairings [G]/ACISP 2003, LNCS2727. Berlin: Springer-Verlag, 2003: 312-323.

DOI: 10.1007/3-540-45067-x_27

Google Scholar