Hyper-elliptic Curves Cryptosystem Based Blind Signature

被引:3
|
作者
Zhou, Xuanwu [1 ]
Yang, Xiaoyuan [1 ]
机构
[1] Chinese Armed Police Force, Coll Engn, Key Lab Network & Informat Secur APF, Xian 710086, Peoples R China
关键词
hyper-elliptic curves cryptosystem; blind signature; system efficiency; probabilistic encryption; coalition attack; PARALLEL INTERFERENCE CANCELLATION; DS-CDMA;
D O I
10.1109/KESE.2009.56
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
HCC (Hyper-elliptic Curves Cryptosystem) is a typical fast public key cryptosystem; it has much superiority in security and application efficiency. We introduced HCC into the designing and analyzing of blind signature, and presented an improved blind signature scheme based on HCC. By utilizing probabilistic encryption and blinding algorithm, the entrusted signer has no knowledge of the message while generating blind signature. The scheme also avoids the relevance between different digital signatures generated by the same entrusted singer, thus it effectively prevents generalized signature forgery and coalition attack by entrusted singer and out adversaries. The one-way trapdoor function of the scheme is based on HCDLP (Hyper-elliptic Curves Discrete Logarithm Problem), so the algorithms take great advantage of the superiority of HCC, such as high efficiency, short key length and etc. The designing strategy not only reinforces the brevity and security of blind signature but also reduces the system overheads regarding software and hardware application environment.
引用
收藏
页码:186 / 189
页数:4
相关论文
共 50 条
  • [31] A Novel Provable Secured Signcryption Scheme PSSS: A Hyper-Elliptic Curve-Based Approach
    Ullah, Insaf
    Ul Amin, Noor
    Naeem, Muhammad
    Khattak, Hizbullah
    Khattak, Shah Jahan
    Ali, Haseen
    MATHEMATICS, 2019, 7 (08)
  • [32] Two Improvements to Digital Signature Scheme Based on the Elliptic Curve Cryptosystem
    Long, Tao
    Liu, Xiaoxia
    PROCEEDINGS OF 2009 INTERNATIONAL WORKSHOP ON INFORMATION SECURITY AND APPLICATION, 2009, : 104 - 107
  • [33] Low-lying Zeros of Quadratic Dirichlet L-Functions, Hyper-elliptic Curves and Random Matrix Theory
    Entin, Alexei
    Roditty-Gershon, Edva
    Rudnick, Zeev
    GEOMETRIC AND FUNCTIONAL ANALYSIS, 2013, 23 (04) : 1230 - 1261
  • [34] Security analysis of a proxy signature scheme based on the elliptic curve cryptosystem
    Wu, Y
    Zhang, YP
    Cao, TJ
    SAM '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2005, : 58 - 64
  • [35] Digital multi-signature scheme based on the elliptic curve cryptosystem
    Chen, TS
    Huang, KH
    Chung, YF
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2004, 19 (04) : 570 - IBC
  • [36] Digital multi-signature scheme based on the Elliptic Curve cryptosystem
    Tzer-Shyong Chen
    Kuo-Hsuan Huang
    Yu-Fang Chung
    Journal of Computer Science and Technology, 2004, 19 : 570 - 573
  • [37] ID-based digital signature scheme on the elliptic curve cryptosystem
    Chung, Yu Fang
    Huang, Kuo Hsuan
    Lai, Feipei
    Chen, Tzer Shyong
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (06) : 601 - 604
  • [38] Low-lying Zeros of Quadratic Dirichlet L-Functions, Hyper-elliptic Curves and Random Matrix Theory
    Alexei Entin
    Edva Roditty-Gershon
    Zeév Rudnick
    Geometric and Functional Analysis, 2013, 23 : 1230 - 1261
  • [39] Bionic Optimized Key Management Scheme Based on Elliptic Curves Cryptosystem
    Zhou, Xuanwu
    2009 SECOND INTERNATIONAL CONFERENCE ON FUTURE INFORMATION TECHNOLOGY AND MANAGEMENT ENGINEERING, FITME 2009, 2009, : 369 - 372
  • [40] Research on constructing elliptic curves suitable for cryptosystem
    Zhang, Longjun
    Zhao, Lin
    Shen, Junyi
    Jisuanji Gongcheng/Computer Engineering, 2000, 26 (08): : 20 - 21