Improvement of a Proxy Blind Multi-Signature Scheme

Article Preview

Abstract:

In this paper, the proxy blind multi-signature scheme proposed by Hu was analyzed, and we show that the scheme is not secure against the attack which the signature requester can tamper with the proxy warrant. In order to overcome the defect, we improve the proxy blind multi-signature scheme. The improved scheme can resist the attack, and meet integrity, unforgeability, verifiability, strong blind. This improved scheme is more secure and practicable, and suitable for electronic commerce.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1198-1202

Citation:

Online since:

September 2014

Authors:

Export:

Price:

[1] Chaum D.Blind Signature for Untraceable Payment's in Advances in Cryptology[C]/proc. of CRYPro'82. NewYork, USA: [s. n. ], 1983: 199-203.

Google Scholar

[2] Fan Chun-I, Lei Chin-Laung. Low-computation partially blind signatures for electronic cash[J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, May 1998 E81 A (n5): 818-824.

Google Scholar

[3] Gallegos_Garcia Gina, G6mez-Cardenas Roberto, Dueh6NSdnchez Gonzalo I. Identity based threshold cryptography and blind signatures for electronic voting[J]. WSEAS Transactions on Computers, January, 2010, 9(n1): 62-71.

Google Scholar

[4] Wang Lu, Kang Baoyuan, Analysis and Improvement of two proxy blind multi-signature schemes, Computer & Digital Engineering, 2012, 40(10) : 102.

Google Scholar

[5] Manbo M, Usuda K, Okamoto E. Proxy signatures for delegating signing operation[J]. Proc 3rd ACM Conference on Computer and Communications Security. ACM Press. 1996: 48-57.

DOI: 10.1145/238168.238185

Google Scholar

[6] Yi Lijiang, Research and Application in Proxy multi-signature scheme. Doctorial Thesis, 2000. 10 (In Chinese).

Google Scholar

[7] Rongxing Lu, Zhenfu Cao, Yuan Zhou. Proxy blind multi-signature scheme without a secure channel[J]. Applied Mathematics and Computation, May 2005, 164(1): 179-187.

DOI: 10.1016/j.amc.2004.04.063

Google Scholar

[8] Hu,Z., Qian,H., Li,Z. Efficient Proxy Blind Multi-signature Scheme. [J]Computer Engineering. 2008, 34(13): 130-132.

Google Scholar

[9] Pointcheval D, Stem J. Security Arguments for Digital Signatures and Blind signatures[J]. Journal of Cryptology, 2000, 13(3): 361-396.

DOI: 10.1007/s001450010003

Google Scholar