Efficient identity-based blind message recovery signature scheme from pairings

被引:14
作者
Verma, Girraj Kumar [1 ]
Singh, B. B. [2 ]
机构
[1] Hindustan Coll Sci & Technol, Farah, Mathura, India
[2] Govt KRG PG Coll, Gwalior, India
关键词
digital signatures; electronic money; government data processing; digital rights management; formal verification; green computing; energy conservation; pairings; BS scheme; green technology; energy efficient technology; computation cost; performance comparison; total message-signature length; verification phase; communication systems; DRM; digital right management systems; e-voting; electronic voting; online transaction; e-cash; electronic cash; efficient identity-based blind message recovery signature scheme; DIGITAL-SIGNATURES; PROXY SIGNATURE; PROVABLY SECURE; CRYPTOSYSTEMS; CRYPTOGRAPHY;
D O I
10.1049/iet-ifs.2017.0342
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Blind signature (BS) schemes are a vital tool to design electronic cash (e-cash), online transaction, electronic voting (e-voting), digital right management (DRM) systems etc. The communication systems designed for such applications need small size and more confidential signature schemes. This article presents the first provably secure and efficient identity-based message recovery BS scheme from pairing. Since, in this scheme, the message is not transmitted with signature and recovered during verification phase, the total message-signature length is the lowest. Due to the blindness, the scheme provides authentication along with anonymity. The performance comparison shows that the authors' scheme consumes the lowest computation cost. Thus, it inspires the energy efficient (green) technology as well as is the most appealing BS scheme towards applications such as e-cash, e-voting, DRM systems etc. using low bandwidth and high security.
引用
收藏
页码:150 / 156
页数:7
相关论文
共 53 条
[1]  
[Anonymous], 2010, SEC 2 REC ELL CURV D
[2]  
[Anonymous], 1995, International Conference on the Theory and Applications of Cryptographic Techniques
[3]  
[Anonymous], IEEE SYST J
[4]   A short ID-based proxy signature scheme [J].
Asaar, Maryam Rajabzadeh ;
Salmasizadeh, Mahmoud ;
Susilo, Willy .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (05) :859-873
[5]  
Barreto PSLM, 2002, LECT NOTES COMPUT SC, V2442, P354
[6]  
Boldyreva A, 2003, LECT NOTES COMPUT SC, V2567, P31
[7]  
Buhse W., 2001, AMCIS 2001 P, P296
[8]  
CHAUM D, 1990, LECT NOTES COMPUT SC, V403, P319
[9]  
Chaum D., 1983, Advances in Cryptology, Proceedings of Crypto 82, P199
[10]   Blind signature and ring signature schemes: Rehabilitation and attack [J].
Chow, Sherman S. M. .
COMPUTER STANDARDS & INTERFACES, 2009, 31 (04) :707-712