New Identity-Based Blind Signature and Blind Decryption Scheme in the Standard Model

被引:5
作者
Phong, Le Trieu [1 ]
Ogata, Wakaha [1 ]
机构
[1] Tokyo Inst Technol, Tokyo 1528552, Japan
关键词
blind HIBE; identity-based blind signature; blind decryption; provable security; standard model; ENCRYPTION; SECURITY;
D O I
10.1587/transfun.E92.A.1822
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We explicitly describe and analyse blind hierachical identity-based encryption (blind HIBE) schemes. which are natural generalizations of blind IBE schemes [20]. We then uses the blind HIBE schemes to construct: (1) An identity-based blind signature scheme secure in the standard model, under the computational Diffie-Hellman (CDH) assumption, and with much shorter signature size and lesser communication cost, compared to existing proposals. (2) A new mechanism supporting a user to buy digital information over the Internet without revealing what he/she has bought, while protecting the providers from cheating users.
引用
收藏
页码:1822 / 1835
页数:14
相关论文
共 37 条
[21]  
Canetti R, 2003, LECT NOTES COMPUT SC, V2656, P255
[22]  
Chan A, 1998, LECT NOTES COMPUT SC, V1403, P561, DOI 10.1007/BFb0054154
[23]  
Chatterjee S, 2006, LECT NOTES COMPUT SC, V4284, P145
[24]  
Chaum D., 1983, Advances in Cryptology, Proceedings of Crypto 82, P199
[25]  
Cramer R, 1994, LNCS, V839, P174, DOI DOI 10.1007/3-540-48658-5
[26]   Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions [J].
Cui, Yang ;
Fujisaki, Eiichiro ;
Hanaoka, Goichiro ;
Imai, Hideki ;
Zhang, Rui .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (01) :53-66
[27]   HOW TO PROVE YOURSELF - PRACTICAL SOLUTIONS TO IDENTIFICATION AND SIGNATURE PROBLEMS [J].
FIAT, A ;
SHAMIR, A .
LECTURE NOTES IN COMPUTER SCIENCE, 1987, 263 :186-194
[28]  
Galindo D, 2006, LECT NOTES COMPUT SC, V4284, P178
[29]  
Gao W, 2008, LECT NOTES COMPUT SC, V5209, P316, DOI 10.1007/978-3-540-85538-5_21
[30]   Hierarchical ID-based cryptography [J].
Gentry, C ;
Silverberg, A .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS, 2002, 2501 :548-566