Skip to main content

A Blind Signature Scheme with Disclaimer Contract in the Standard Model

  • Conference paper
  • First Online:
Cloud Computing and Security (ICCCS 2018)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11064))

Included in the following conference series:

  • 1906 Accesses

Abstract

It is difficult to construct a blind signature scheme in the standard model that conforms to the formalized blindness. The difficulty lies in eliminating the blindness when the scheme is constructed. Focused on the blind nature and using the bilinear pairing, a signature scheme with disclaimer contract is proposed on the basis of the Waters signature scheme, which has provable security and blind features. Besides, the security proof of the scheme is given in the standard model. In general, the scheme has the characteristics of self-eliminating blindness and higher efficiency. It is easy to be realized in the standard model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chaum, D.: Blind signatures for untraceable payments. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Advances in Cryptology, pp. 199–203. Springer, Boston, MA (1983). https://doi.org/10.1007/978-1-4757-0602-4_18

    Chapter  Google Scholar 

  2. Choon, J.C., Hee Cheon, J.: An identity-based signature from gap Diffie-Hellman groups. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 18–30. Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-36288-6_2

    Chapter  Google Scholar 

  3. Xun, Y.: An identity-based signature scheme from the Weil pairing. IEEE Commun. Lett. 7(2), 76–78 (2003)

    Article  Google Scholar 

  4. Zhang, B., Xu, Q.: Certificateless proxy blind signature scheme from bilinear pairings. In: The 2nd International Workshop on Knowledge Discovery and Data Mining, IWKDD 2009, Washington, vol. 47, pp. 573–576. IEEE Computer Society (2009)

    Google Scholar 

  5. Han, S., Chang, E.: A pairing-based blind signature scheme with message recovery. Int. J. Inf. Technol. 2(4), 187–192 (2005)

    MathSciNet  Google Scholar 

  6. Zhang, Y.H., Chen, M.: Extended identity-based partially blind signature scheme in the standard model. Comput. Eng. Appl. 46(1), 95–101 (2014)

    MathSciNet  Google Scholar 

  7. Deng, Y.Q., Du, M.H., Yao, Z.L.: A blind proxy re-signatures scheme based on standard model. J. Electron. Inf. Technol. 32(5), 1219–1223 (2010)

    Google Scholar 

  8. Bellare, M.: Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of the 1st Conference on Computer and Communications Security, vol. 27, pp. 62–73. ACM Press (1993)

    Google Scholar 

  9. Waters, B.: Efficient identity-based encryption without random oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114–127. Springer, Heidelberg (2005). https://doi.org/10.1007/11426639_7

    Chapter  Google Scholar 

  10. Hwang, Y.H., Liu, J.K., Chow, S.S.: Certificateless public key encryption secure against malicious KGC attacks in the standard model. J. Univers. Comput. Sci. 14(3), 463–480 (2008)

    MathSciNet  MATH  Google Scholar 

  11. Boneh, D., Boyen, X.: Efficient selective identity-based encryption without random oracles. J. Cryptol. 24(4), 659–693 (2011)

    Article  MathSciNet  Google Scholar 

  12. Boneh, D., Boyen, X.: Short signatures without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 56–73. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24676-3_4

    Chapter  Google Scholar 

  13. Boneh, D., Shacham, H., Lynn, B.: Short signatures from the Weil pairing. J. Cryptol. 17(4), 297–319 (2004)

    Article  MathSciNet  Google Scholar 

  14. Gu, K., Jia, W.J., Wang, S.C.: Proxy signature in the standard model: constructing security model and proving security. J. Softw. 23(9), 2416–2429 (2012)

    Article  MathSciNet  Google Scholar 

  15. Yu, Y., Ni, J.B., Xu, C.X.: Cryptanalysis of a secure and efficient identity-based signature scheme. J. Softw. 25(5), 1125–1131 (2014)

    MathSciNet  Google Scholar 

  16. Chen, M.: Identity-based proxy blind signature scheme in standard model. J. Sichuan Univ. (Eng. Sci. Ed.) 51(19), 103–109 (2015)

    Google Scholar 

  17. Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-44647-8_13

    Chapter  Google Scholar 

  18. Abe, M., Okamoto, T.: Provably secure partially blind signatures. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 271–286. Springer, Heidelberg (2000). https://doi.org/10.1007/3-540-44598-6_17

    Chapter  Google Scholar 

  19. Okamoto, T.: Efficient blind and partially blind signatures without random oracles. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 80–99. Springer, Heidelberg (2006). https://doi.org/10.1007/11681878_5

    Chapter  Google Scholar 

  20. Zhang, F., Kim, K.: Efficient ID-based blind signature and proxy signature from bilinear pairings. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol. 2727, pp. 312–323. Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-45067-X_27

    Chapter  Google Scholar 

  21. Ghadafi, E.: Efficient round-optimal blind signatures in the standard model. In: Kiayias, A. (ed.) FC 2017. LNCS, vol. 10322, pp. 455–473. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-70972-7_26

    Chapter  Google Scholar 

  22. Verma, G.K., Singh, B.B.: Efficient identity-based blind message recovery signature scheme from pairings. IET Inf. Secur. 12(2), 150–156 (2018)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgements

This work is partially supported by the National Natural Science Foundation of China (11361024), the Natural Science Foundation Projects of Jiangxi Province (20171BAB201009), the Science and Technology Project of Jiangxi Province Office of Education (GJJ170386), the Innovation Fund Designated for Graduate Students of Jiangxi Province (YC2017-S257).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Liming Zuo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zuo, L., Zhang, M., Zhang, T., Hu, K. (2018). A Blind Signature Scheme with Disclaimer Contract in the Standard Model. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11064. Springer, Cham. https://doi.org/10.1007/978-3-030-00009-7_37

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00009-7_37

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00008-0

  • Online ISBN: 978-3-030-00009-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics