Computer Science ›› 2013, Vol. 40 ›› Issue (5): 136-140.

Previous Articles     Next Articles

“Reduction Attacks” in Partially Blind Signature Based on Bilinear Pairings

HOU Zheng-feng,WANG Xin,HAN Jiang-hong and ZHU Xiao-ling   

  • Online:2018-11-16 Published:2018-11-16

Abstract: We studied three partially blind signature schemes,and found out the similarity in signature formulas of the three schemes.Then we compared and analized the three corresponding methods of“reduction attacks”,and the basic reason why these schemes are vulnerable to tampering common information attacks was pointed out.From the above analysis results,we deduced the conclusion that a class of partially blind signature schemes based on bilinear pairings are vulnerable to “reduction attacks”.Moreover,the deduction was verified.

Key words: Bilinear pairings,Partially blind signature,Tampering common information attacks

[1] Chaum D.Blind signatures for untraceable payments[C]∥Proc.Advances in Cryptology-Crypto’82.Santa Barbara,California,USA,Aug.1982:199-203
[2] Abe M,Fujisaki E.How to Date Blind Signature[C]∥Asia-crypt’96,LNCS 1136.Berlin:Springer-Verlag,1996:244-251
[3] Chien H Y,Jan J K,Tseng Y M.RSA-Based Partially Blind Signature with Low Computation[C]∥IEEE 8th International Conference on Parallel and Distributed Systems.2001:385-389
[4] Wen H A,Lee K C,Hwang S Y,et al.On the traceability on RSA-based partially signature with low computation[J].Applied Mathematics and Computation,2005,2:421-425
[5] Fang De-jian,Wang Na,Liu Cheng-lian.An Enhanced RSA-based Partially Blind Signature[C]∥2010International Confe-rence on Computer and Communication Technologies in Agriculture Engineering.2010:565-567
[6] Chow S S M,Hui L C K,Yiu S M,et al.Two improved partially blind signature schemes from bilinear pairings[C]∥Proc.Australasian Conference on Information Security and Pricacy-ACISP 2005,LNCS 3574.Brisbane,Australia:Springer-Verlag,2005:316-328
[7] Hu Xiao-ming,Huang Shang-teng.An Effcient ID-based PartiallyBlind Signature Scheme[C]∥Eighth ACIS International Confe-rence on Software Engineering,Artificial Intelligence,Networking,and Parallell Distributed Computing.IEEE,2007:291-296
[8] 张学军,王育民.高效的基于身份的部分盲签名方案[J].计算机工程与应用,2007,43(11):211-213
[9] 荣维坚.无证书部分盲签名方案[J].漳洲师范学院学报:自然科学版,2008,62(4):44-47
[10] 崔巍,辛阳,胡程瑜,等.高效的基于身份的(受限)部分盲签名[J].北京邮电大学学报,2008,31(4):53-57
[11] Kang Bao-yuan,Han Jin-guang.On thesecurity of blind signature and partially blindsignature,Education Technology and Computer(ICETC)[C]∥20102nd International Conference.V5,0:206-208
[12] 闫东升.一个新的高效的基于身份的部分盲签名方案[J].计算机工程与应用,2008,44(2):137-140
[13] 李明祥,王涛,罗新方.对两种基于双线性对的部分盲签名方案的密码学分析[J].计算机应用研究,2011,28(2):435-438

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!