Generic Construction for Identity-Based Proxy Blind Signature

被引:2
作者
Bultel, Xavier [1 ]
Lafourcade, Pascal [2 ]
Olivier-Anclin, Charles [2 ]
Robert, Leo [2 ]
机构
[1] Univ Orleans, INSA Ctr Val Loire, LIFO, Orleans, France
[2] Univ Clermont Auvergne, LIMOS, CNRS, Mines St Etienne, Clermont Ferrand, France
来源
FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2021 | 2022年 / 13291卷
关键词
ID-BASED BLIND; VERIFIABLE RANDOM FUNCTIONS; SCHEME;
D O I
10.1007/978-3-031-08147-7_3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Generic constructions of blind signature schemes have been studied since its appearance. Several constructions were made leading to generic blind signatures and achieving other properties such as identity-based blind signature and partially blind signature. We propose a generic construction for identity-based Proxy Blind Signature (IDPBS). This combination of properties has several applications in the real world, in particularly in e-voting or e-cash systems and it has never been achieved before with a generic construction. Our construction only requires two classical signatures schemes: a blind EUF-CMA blind signature and a SUF-CMA unique signature. The security of our generic identity-based proxy blind signature is proven under these assumptions.
引用
收藏
页码:34 / 52
页数:19
相关论文
共 36 条
[1]   Verifiable Random Functions: Relations to Identity-Based Key Encapsulation and New Constructions [J].
Abdalla, Michel ;
Catalano, Dario ;
Fiore, Dario .
JOURNAL OF CRYPTOLOGY, 2014, 27 (03) :544-593
[2]  
Abe M., 1996, Advances in Cryptology - ASIACRYPT'96 International Conference on the Theory and Applications of Cryptology and Information Security. Proceedings, P244, DOI 10.1007/BFb0034851
[3]  
[Anonymous], 1995, International Conference on the Theory and Applications of Cryptographic Techniques
[4]  
[Anonymous], 1985, P WORKSH THEOR APPL
[5]  
[Anonymous], 2002, MM RES PREPR
[6]  
Bellare M, 1996, LECT NOTES COMPUT SC, V1070, P399
[7]   Secure Proxy Signature Schemes for Delegation of Signing Rights [J].
Boldyreva, Alexandra ;
Palacio, Adriana ;
Warinschi, Bogdan .
JOURNAL OF CRYPTOLOGY, 2012, 25 (01) :57-115
[8]   Short signatures from the Weil pairing [J].
Boneh, D ;
Lynn, B ;
Shacham, H .
JOURNAL OF CRYPTOLOGY, 2004, 17 (04) :297-319
[9]  
Camenisch J. L., 1995, Advances in Cryptology - EUROCRYPT '94. Workshop on the Theory and Application of Cryptographic Techniques. Proceedings, P428, DOI 10.1007/BFb0053458
[10]  
Chaum D., 1983, Advances in Cryptology, Proceedings of Crypto 82, P199