Partially Blind ECDSA Scheme and Its Application to Bitcoin

被引:29
作者
Huang, Hongxun [1 ]
Liu, Zi-Yuan [1 ]
Tso, Raylin [1 ]
机构
[1] Natl Chengchi Univ, Dept Comp Sci, Taipei 11605, Taiwan
来源
2021 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC) | 2021年
关键词
Partially blind signature; ECDSA; Bitcoin; Blockchain; PROVABLY SECURE; SIGNATURE SCHEME;
D O I
10.1109/DSC49826.2021.9346233
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Blind signatures allow a user to obtain a signature without revealing message information to the signer. However, in many cases, the signer must record additional information relevant to the signature. Therefore, the concept of partially blind signature is introduced that enables the signer to obtain some information from the signed message. With the development of blockchain technology, users increasingly use Bitcoin for purchases and transactions with coin providers. Some studies have indicated that Elliptic Curve Digital Signature Algorithm (ECDSA)-based blind signatures are compatible with Bitcoin because they prevent the linking of sensitive information due to the untamability of Bitcoin. However, these approaches are not sufficiently flexible because blind signatures do not allow the signer to obtain any information. Here, we propose an ECDSA-based partially blind signature scheme. Security proofs are provided to demonstrate that the proposed scheme have satisfactory unforgeability and blindness. To the best of our knowledge, compared with other state-of-the-art schemes, our scheme is the first ECDSA-based partially blind signature scheme compatible with the current Bitcoin protocol.
引用
收藏
页数:8
相关论文
共 23 条
  • [1] Abe M., 1996, Advances in Cryptology - ASIACRYPT'96 International Conference on the Theory and Applications of Cryptology and Information Security. Proceedings, P244, DOI 10.1007/BFb0034851
  • [2] Abe M, 2000, LECT NOTES COMPUT SC, V1880, P271
  • [3] Bellare M., 1997, Advances in Cryptology - EUROCRYPT '97. International Conference on the Theory and Application of Cryptographic Techniques Proceedings, P163
  • [4] Blazy Olivier, 2012, Security and Cryptography for Networks. Proceedings of the 8th International Conference (SCN 2012), P95, DOI 10.1007/978-3-642-32928-9_6
  • [5] Brands S., 1993, An efficient off-line electronic cash system based on the representation problem
  • [6] Chaum D., 1983, Advances in Cryptology, Proceedings of Crypto 82, P199
  • [7] RSA-based partially blind signature with low computation
    Chien, HY
    Jan, JK
    Tseng, YM
    [J]. PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, 2001, : 385 - 389
  • [8] Chow SSM, 2005, LECT NOTES COMPUT SC, V3574, P316
  • [9] HOW TO PROVE YOURSELF - PRACTICAL SOLUTIONS TO IDENTIFICATION AND SIGNATURE PROBLEMS
    FIAT, A
    SHAMIR, A
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1987, 263 : 186 - 194
  • [10] Gura N, 2004, LECT NOTES COMPUT SC, V3156, P119