A blind signature scheme based on ElGamal signature

被引:16
作者
Mohammed, E [1 ]
Emarah, AE [1 ]
El-Shennawy, K [1 ]
机构
[1] Arab Acad Sci & Technol, Mil Tech Coll, Cairo, Egypt
来源
IEEE/AFCEA EUROCOMM 2000, CONFERENCE RECORD: INFORMATION SYSTEMS FOR ENHANCED PUBLIC SAFETY AND SECURITY | 2000年
关键词
D O I
10.1109/EURCOM.2000.874771
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a new generalized blind signature scheme based on EIGamal signatures. This new scheme has a valuable property that assures that if a message is signed multiple times the corresponding signatures Hill be different. This adds to the anonymity of the blinded signatures. Public Key Cryptosystems are beneficial In encryption as well as signing which plays an essential role In electronic banking and financial transactions. The current research introduces a generalized signature scheme that could be used to generate blinded signatures as well as ordinary EIGamal signatures. The new scheme is found to be comparable to the RSA blinding. Moreover, the new scheme has the advantage of having less computational complexity and is raster than RSA in the blinding procedure.
引用
收藏
页码:51 / 53
页数:3
相关论文
共 50 条
[21]   An ECDLP based Untraceable Blind Signature Scheme [J].
Nayak, Sanjeet Kumar ;
Majhi, Banshidhar ;
Mohanty, Sujata .
PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT 2013), 2013, :829-834
[22]   A Proxy Blind Signature Scheme Based on DLP [J].
YU Baozheng XU Congwei School of Management Hefei University of Technology Hefei Anhui China .
WuhanUniversityJournalofNaturalSciences, 2007, (01) :83-86
[23]   A proxy blind signature scheme based on ECDLP [J].
Wang, H ;
Wang, R .
CHINESE JOURNAL OF ELECTRONICS, 2005, 14 (02) :281-284
[24]   Cryptoanalysis of Certificateless Partially Blind Signature and Proxy Blind Signature Scheme [J].
Zhang, Jianhong ;
Chen, Hua ;
Geng, Qin .
PROCEEDINGS OF THE 2009 2ND INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOLS 1-9, 2009, :1491-1495
[25]   A new blind signature and threshold blind signature scheme from pairings [J].
Cui, Wei ;
Xin, Yang ;
Yang, Yixian ;
Niu, Xinxin .
CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, :699-702
[26]   An untraceable blind signature scheme [J].
Hwang, MS ;
Lee, CC ;
Lai, YC .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2003, E86A (07) :1902-1906
[27]   Certificateless blind signature scheme [J].
Su, Wan-Li ;
Zhang, Yue-Yu ;
Zhang, Xiao-Hong ;
Wang, Yu-Min .
Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2009, 38 (04) :533-536
[28]   Ring blind signature scheme [J].
Hu, Chengyu ;
Li, Daxing .
SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 1, PROCEEDINGS, 2007, :869-+
[29]   An electronic voting scheme based on undeniable blind signature scheme [J].
Yun, SH ;
Lee, SJ .
37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2003, :163-167
[30]   ELGAMAL DIGITAL SIGNATURE SCHEME WITH INTEGRATED CFEA-TECHNIQUE [J].
Mandangan, Arif ;
Hussin, Che Haziqah Che ;
Hung, Chang Ee .
JURNAL TEKNOLOGI, 2016, 78 (6-4) :35-39