A blind signature scheme based on ElGamal signature

被引:16
作者
Mohammed, E [1 ]
Emarah, AE [1 ]
El-Shennawy, K [1 ]
机构
[1] Arab Acad Sci & Technol, Mil Tech Coll, Cairo, Egypt
来源
IEEE/AFCEA EUROCOMM 2000, CONFERENCE RECORD: INFORMATION SYSTEMS FOR ENHANCED PUBLIC SAFETY AND SECURITY | 2000年
关键词
D O I
10.1109/EURCOM.2000.874771
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a new generalized blind signature scheme based on EIGamal signatures. This new scheme has a valuable property that assures that if a message is signed multiple times the corresponding signatures Hill be different. This adds to the anonymity of the blinded signatures. Public Key Cryptosystems are beneficial In encryption as well as signing which plays an essential role In electronic banking and financial transactions. The current research introduces a generalized signature scheme that could be used to generate blinded signatures as well as ordinary EIGamal signatures. The new scheme is found to be comparable to the RSA blinding. Moreover, the new scheme has the advantage of having less computational complexity and is raster than RSA in the blinding procedure.
引用
收藏
页码:51 / 53
页数:3
相关论文
共 50 条
[41]   A proxy blind signature scheme based on quantum entanglement [J].
Tian, Yuan ;
Chen, Hong ;
Yan, Gao ;
Tian, Jingfeng ;
Wen, Xiaojun .
OPTICAL AND QUANTUM ELECTRONICS, 2013, 45 (12) :1297-1305
[42]   ID-based proxy blind signature scheme [J].
School of Mathematics and Computer Science, Nanjing Normal University, Nanjing 210097, China ;
不详 .
Jisuanji Gongcheng, 2006, 17 (203-204+224)
[43]   A Correction to a Code-Based Blind Signature Scheme [J].
Blazy, Olivier ;
Gaborit, Philippe ;
Dang Truong Mac .
CODE-BASED CRYPTOGRAPHY (CBCRYPTO 2021), 2022, 13150 :84-94
[44]   A Study of Anonymous Delivery Based on Blind Signature Scheme [J].
Wu, Jieling ;
Liu, Chenglian .
6TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2015), THE 5TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2015), 2015, 52 :1065-1070
[45]   IDENTITY-BASED XTR BLIND SIGNATURE SCHEME [J].
Tang, Qiaoying ;
Shen, Fengxian .
INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2013, 19 (02) :143-149
[46]   A more effective voting scheme based on blind signature [J].
Wang, Lina ;
Guo, Jingli ;
Luo, Min .
2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, :1507-1510
[47]   A Secure Proxy Blind Signature Scheme Based on ECDLP [J].
Hu, Lanlan ;
Zheng, Kangfeng ;
Hu, Zhengming ;
Yang, Yixian .
MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, :454-457
[48]   A New Code-Based Blind Signature Scheme [J].
Chen, Siyuan ;
Zeng, Peng ;
Choo, Kim-Kwang Raymond .
COMPUTER JOURNAL, 2022, 65 (07) :1776-1786
[49]   A new blind identity-based signature scheme [J].
Elkamchouchi, Hassan ;
Abouelseoud, Yasmine .
2008 5TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2008, :1102-1106
[50]   A simple anonymous fingerprinting scheme based on blind signature [J].
Wang, Y ;
Lü, SW ;
Liu, ZH .
INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 :260-268