Abstract
This paper describes an efficient simple proxy blind signature scheme. The security of the scheme is based on Elliptic Curve Discrete Logarithm Problem(ECDLP). This can be implemented in low power and small processor mobile devices such as smart card, PDA etc. A proxy blind signature scheme is a special form of blind signature which allows a designated person called proxy signer to sign on behalf of two or more original signers without knowing the content of the message or document. It combines the advantages of proxy signature and blind signature scheme and satisfies the security properties of both proxy and blind signature scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Mambo, M., Usda, K., Okamoto, E.: Proxy signature: Delegation of power to sign messages. IEICE Transaction on Fundamentals E79-A, 1338–1353 (1996)
J.P.Kar Proxy Blind multi-signature scheme using ECC for handheld devices, ePrint Archive: Report 2011/043, http://eprint.iacr.org/2011/43
Chaum, D.: Blind Signature for Untraceable Payments. In: Crypto 82, pp. 199–203. Plenum Press, New York (1983)
Hwang, S.J., Shi, C.H.: A Simple multi-signature scheme. In: Proceeding of 10th National Conference On Information Security, Taiwan (2000)
Koblitz, N.: A course in Number Theory and Cryptography, 2nd edn. Springer, Heidelberg (1994)
Rosen, K.H.: Elementary Number Theory in Science and Communication, 2nd edn. Springer-Verlag, Berlin (1986)
Menezes, A., Van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography. CRC Press, New York (1997)
Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer Verlag, Berlin (2004)
Certicom, E.C.C.: Challenge and The Elliptic Curve Cryptosystem, http://www.certicom.com/index.php.
Dwork, C., Naor, M., Sahai, A.: Concurrent zero-knowledge. In: Proceedings of 30th ACM STOC1998, pp. 409–418 (1998)
Abdalla, M., Bellare, M., Rogaway, P.: The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 143–158. Springer, Heidelberg (2001)
Aumann, Y., Rabin, M.O.: Authentication, Enhanced Security and Error Correcting Codes. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 299–303. Springer, Heidelberg (1998)
Diffie, W., Hellman, M.E.: Directions in cryptography. IEEE Transactions on Information Theory 22, 644–654 (1976)
Shi, Y., Li, J.: Identity-based deniable authentication protocol. Electronics Letters 41, 241–242 (2005)
Shoup, V.: Sequences of games: a tool for taming complexity in security proofs, in Cryptology ePrint Archive: Report 2004/332, http://eprint.iacr.org/2004/332
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Alghazzawi, D.M., Salim, T.M., Hasan, S.H. (2011). A Secure Proxy Blind Signature Scheme Using ECC. In: Fong, S. (eds) Networked Digital Technologies. NDT 2011. Communications in Computer and Information Science, vol 136. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22185-9_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-22185-9_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22184-2
Online ISBN: 978-3-642-22185-9
eBook Packages: Computer ScienceComputer Science (R0)