Published September 25, 2009
| Version 12975
Journal article
Open
A Secure Blind Signature Scheme for Computation Limited Users
Creators
Description
This manuscript presents a fast blind signature scheme with extremely low computation for users. Only several modular additions and multiplications are required for a user to obtain and verify a signature in the proposed scheme. Comparing with the existing ones in the literature, the scheme greatly reduces the computations for users.
Files
12975.pdf
Files
(162.5 kB)
Name | Size | Download all |
---|---|---|
md5:5558d03221e6d20557d6a690ff96931d
|
162.5 kB | Preview Download |
Additional details
References
- J. Camenisch, J. Piveteau, and M. Stadler, "Blind signatures based on the discrete logarithm problem," Advances in Cryptology-EUROCRYPT-94, LNCS 950, Springer-Verlag, 1995, pp. 428-432.
- D. Chaum, "Blind signatures for untraceable payments," Advances in Cryptology-CRYPTO-82, Plenum, 1983, pp. 199-203.
- D. Chaum, A. Fiat, and M. Naor, "Untraceable electronic cash," Advances in Cryptology-CRYPTO-88, LNCS 403, Springer-Verlag, 1990, pp. 319- 327.
- C. Chen, C. Chang, and W. Yang, "Hybrid method for modular exponentiation with precomputation," IEE Electronics Letters, vol. 32, no. 6, 1996, pp. 540-541.
- J. Coron, D. Naccache, and J. Stern, "On the security of RSA padding," Advances in Cryptology-CRYPTO-99, LNCS 1666, Springer-Verlag, 1999, pp. 1-18.
- V. Dimitrov and T. Cooklev, "Two algorithms for modular exponentiation using nonstandard arithmetics," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E78-A, no. 1, 1995, pp. 82-87.
- C. Fan and C. Lei, "A multi-recastable ticket scheme for electronic elections," Advances in Cryptology-ASIACRYPT-96, LNCS 1163, Springer- Verlag, 1996, pp. 116-124.
- C. Fan and C. Lei, "User efficient blind signatures," IEE Electronics Letters, vol. 34, no. 6, 1998, pp. 544-546.
- C. Fan, W. Chen, and Y. Yeh, "Randomization enhanced Chaum-s blind signature scheme," Advances in Research and Application of Network Security, Computer Communications, vol. 23, no. 17, 2000, pp. 1677- 1680. [10] C. Fan and C. Lei, "Cryptanalysis on Improved User Efficient Blind Signatures," IEE Electronics Letters, vol. 37, no. 10, 2001, pp. 630-631. [11] N. Ferguson, "Single term off-line coins," Advances in Cryptology- EUROCRYPT-93, LNCS 765, Springer-Verlag, 1994, pp. 318-328. [12] S. Goldwasser, S. Micali, and R. Rivest, "A digital signature scheme secure against adaptive chosen-message attacks," Technical Report, MIT Lab., Computer Science, Cambridge, Mass. March, 1995. [13] L. Guillou and J. Quisquater, "A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory," Advances in Cryptology-EUROCRYPT-88, LNCS 330, Springer-Verlag, 1988, pp. 123-128,. [14] A. Menezes, P. van Oorschot, and S. Vanstone, Handbook of applied cryptography, CRC Press LLC, 1997. [15] NIST FIPS PUB XX, Digital Signature Standard (DSS), National Institute of Standards and Technology, U.S. Department of Commerce, DRAFT, 1993. [16] K. Nyberg and R. Rueppel, "A new signature scheme based on the DSA giving message recovery schemes," The first ACM Conference on Computer and Communications Security, Fairfax, Virginia, 1994. [17] T. Okamoto, "Provably secure and practical identification schemes and corresponding signature schemes," Advances in Cryptology-CRYPTO-92, LNCS 740, Springer-Verlag, 1992, pp. 31-53. [18] R. Peralta, "A simple and fast probabilistic algorithm for computing square roots modulo a prime number," IEEE Transactions on Information Theory, vol. 32, no. 6, 1986, pp. 846-847. [19] S. Pohlig and M. Hellman, "An improved algorithm for computing logarithms over GF(p) and its cryptographic significance," IEEE Transactions on Information Theory, vol. 24, 1978, pp. 106-110. [20] D. Pointcheval and J. Stern, "Provably secure blind signature schemes," Advances in Cryptology-ASIACRYPT-96, LNCS 1163, Springer-Verlag, 1996, pp. 252-265. [21] D. Pointcheval and J. Stern, "New blind signatures equivalent to factorization," Proceedings of the 4th ACM Conference on Computer and Communication Security, 1997, pp. 92-99. [22] M. Rabin, "Digitalized signatures and public-key functions as intractable as factorization," Technical Report, MIT/LCS/TR212, MIT Lab., Computer Science, Cambridge, Mass. Jan. 1979. [23] R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public key cryptosystems," Communications of the ACM, vol. 21, no. 2, 1978, pp. 120-126. [24] C. Schnorr, "Efficient identification and signatures for smart cards," Advances in Cryptology-CRYPTO-89, Springer-Verlag, LNCS 435, 1990, pp. 235-251. [25] A. Shamir and C. Schnorr, "Cryptanalysis of certain variants of Rabin-s signature scheme," Information Processing Letters, vol. 19, 1984, pp. 113-115. [26] Z. Shao, "Improved user efficient blind signatures," IEE Electronics Letters, vol. 36, no. 16, 2000, pp. 1372-1374. [27] G. Simmons, Contemporary Cryptology: The Science of Information Integrity, IEEE Press, N.Y., 1992. [28] H. Williams, "A modification of the RSA public-key encryption procedure," IEEE Transactions on Information Theory, vol. 26, no. 6, 1980, pp. 726-729.