Computer Science ›› 2019, Vol. 46 ›› Issue (6A): 358-361.

• Information Security • Previous Articles     Next Articles

Improved Efficient Proxy Blind Signature Scheme

WANG Xing-wei, HOU Shu-hui   

  1. School of Mathematics and Physics,University of Science and Technology Beijing,Beijing 100083,China
  • Online:2019-06-14 Published:2019-07-02

Abstract: Through the analysis of the certificateless proxy blind signature scheme,we found that the efficiency of the scheme is not high.Besides,although this scheme has been proved to be able to resist malicious but passive attacks of bad KGC,there is no such KGC that can be fully trusted in the real world.Based on ECDLP problem and Bilinear Pairing,this paper presented an improved efficient proxy blind signature scheme without KGC,and demonstrates the correctness and security of the scheme.

Key words: Digital signature, Efficiency analysis, KGC, Proxy blind signature

CLC Number: 

  • TP309
[1]CHAUM D.Blind Signature for Untraceable Payments[C]∥Advance in Cryptology:Proceedings of Crypto’82.1983:199-203.
[2]MAMBO M,USUDA K,OKAMOTO E.Proxy signa-ture for delegating signing operation[C]∥Proceedings of the 3rd ACM Conference on Computer and Communications Security.ACM,1996:48-57.
[3]LIN W D,JAN J K.A security personal learning tools using a proxy blind signature scheme[C]∥Proc of International Conference on Chinese Language Computing.2000:273-277.
[13]BARRETO P S L M.GALBRAITH S D,O’HEIGEARTAIGH C,et al.Efficient pairing computation on super singular abelian varieties[J].Designs,Codes and Cryptography,2007,42(3):239-271.
[1] REN Chang, ZHAO Hong, JIANG Hua. Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [J]. Computer Science, 2022, 49(5): 333-340.
[2] JIANG Hao-kun, DONG Xue-dong, ZHANG Cheng. Improved Certificateless Proxy Blind Signature Scheme with Forward Security [J]. Computer Science, 2021, 48(6A): 529-532.
[3] DAI Chuang-chuang, LUAN Hai-jing, YANG Xue-ying, GUO Xiao-bing, LU Zhong-hua, NIU Bei-fang. Overview of Blockchain Technology [J]. Computer Science, 2021, 48(11A): 500-508.
[4] ZHANG Jun-he, ZHOU Qing-lei and HAN Ying-Jie. Sanitizable Signature Scheme Based on Ring Signature and Short Signature [J]. Computer Science, 2020, 47(6A): 386-390.
[5] JIANG Ze-tao, XU Juan-juan. Efficient Heterogeneous Cross-domain Authentication Scheme Based on Proxy Blind Signature in Cloud Environment [J]. Computer Science, 2020, 47(11): 60-67.
[6] ZUO Li-ming,CHEN Lan-lan. Special Digital Signature Scheme Based on Identity Identification and Its Application [J]. Computer Science, 2020, 47(1): 309-314.
[7] LIU Ya-qiang,LI Xiao-yu. Mobile Secure Payment Scheme Using Identity-based Cryptographic Algorithm+SMS Verification Code [J]. Computer Science, 2020, 47(1): 293-301.
[8] LI Lei, JIA Hui-wen, BAN Xue-hua and HE Yu-fan. Obfuscation-based Broadcasting Multi-signature Scheme [J]. Computer Science, 2017, 44(Z11): 329-333.
[9] YE Jun-yao, ZHENG Dong and REN Fang. Improved Veron’s Identification with Lightweight Structure and Digital Signature Scheme [J]. Computer Science, 2017, 44(3): 168-174.
[10] LIU Er-gen, WANG Xia, ZHOU Hua-jing and GUO Hong-li. Improved Certificateless Proxy Blind Signature Scheme [J]. Computer Science, 2016, 43(8): 92-94.
[11] REN Yan. Deniable Attribute-based Designated Confirmer Signature without Random Oracles [J]. Computer Science, 2016, 43(7): 162-165.
[12] WANG Hu-qing and SUN Zhi-xin. Research on ONS Security [J]. Computer Science, 2016, 43(1): 1-7.
[13] LIU Ya-li, QIN Xiao-lin, ZHAO Xiang-jun, HAO Guo-sheng and DONG Yong-quan. Lightweight RFID Authentication Protocol Based on Digital Signature [J]. Computer Science, 2015, 42(2): 95-99.
[14] ZHOU Ke-yuan. Digital Signature Scheme Based on Elliptic Curve and Factoring [J]. Computer Science, 2014, 41(Z6): 366-368.
[15] CAO Shuai and WANG Shu-ying. Research on Security Technology of Workflow Customization for Collaborative SaaS Platform of Industrial Chains [J]. Computer Science, 2014, 41(1): 230-234.
Full text



No Suggested Reading articles found!