A User Efficient Fair Blind Signature Scheme for Untraceable Electronic Cash

Blind signatures have been widely adopted to construct untraceable electronic cash systems since they are both unlinkable and unforgeable. Although unlinkability protects the privacy of customers and users, it may be abused by criminals for such purposes as to launder money or to safely get a ransom. The techniques of fair blind signatures are developed to deal with the abuse of unlinkability. In this paper we propose a user efficient fair blind signature scheme which makes it possible for a government or a judge to recover the link between a signature and the instance of the signing protocol which produces that signature when the unlinkability property is abused. Only two integers are required to form a signature in the proposed fair blind signature scheme. Furthermore, it only takes several modular multiplications for a user to obtain and verify a signature. It turns out that the scheme is suitable for situations where computation capability of users or customers is limited, such as smart cards and mobile units. Compared with existing blind signature schemes proposed in the literatures, our method reduces the computation required of users by more than 99%.

[1]  Colin Boyd,et al.  A New Multiple Key Cipher and an Improved Voting Scheme , 1990, EUROCRYPT.

[2]  Tatsuaki Okamoto,et al.  Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes , 1992, CRYPTO.

[3]  Adi Shamir,et al.  Cryptanalysis of Certain Variants of Rabin's Signature Scheme , 1984, Inf. Process. Lett..

[4]  Atsushi Fujioka,et al.  A Practical Secret Voting Scheme for Large Scale Elections , 1992, AUSCRYPT.

[5]  Wei-Kuei Chen,et al.  Efficient on-line electronic checks , 2005, Appl. Math. Comput..

[6]  Stefan BrandsCWI,et al.  Untraceable Oo-line Cash in Wallets with Observers , 1993 .

[7]  Oded Goldreich,et al.  A randomized protocol for signing contracts , 1985, CACM.

[8]  Tatsuaki Okamoto,et al.  Universal Electronic Cash , 1991, CRYPTO.

[9]  Jan Camenisch,et al.  Fair Blind Signatures , 1995, EUROCRYPT.

[10]  Jacques Stern,et al.  New Blind Signatures Equivalent to Factorization , 1997, CCS 1997.

[11]  Claus-Peter Schnorr,et al.  Efficient Identification and Signatures for Smart Cards (Abstract) , 1990, EUROCRYPT.

[12]  Chin-Laung Lei,et al.  A Multi-Recastable Ticket Scheme for Electronic Elections , 1996, ASIACRYPT.

[13]  Lila Kari,et al.  Secret ballot elections in computer networks , 1991, Computers & security.

[14]  C. P. Schnorr,et al.  Efficient Identification and Signatures for Smart Cards (Abstract) , 1989, EUROCRYPT.

[15]  Jean-Jacques Quisquater,et al.  A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory , 1988, EUROCRYPT.

[16]  René C. Peralta,et al.  A simple and fast probabilistic algorithm for computing square roots modulo a prime number , 1986, IEEE Trans. Inf. Theory.

[17]  Jan Camenisch,et al.  Blind Signatures Based on the Discrete Logarithm Problem , 1994, EUROCRYPT.

[18]  Hugh C. Williams,et al.  A modification of the RSA public-key encryption procedure (Corresp.) , 1980, IEEE Trans. Inf. Theory.

[19]  Edwin Weiss,et al.  A user authentication scheme not requiring secrecy in the computer , 1974, Commun. ACM.

[20]  Niels Ferguson,et al.  Single Term Off-Line Coins , 1994, EUROCRYPT.

[21]  Chin-Laung Lei,et al.  User efficient blind signatures , 1998 .

[22]  Jacques Stern,et al.  Provably Secure Blind Signature Schemes , 1996, ASIACRYPT.

[23]  George B. Purdy,et al.  A high security log-in procedure , 1974, Commun. ACM.

[24]  Chin-Laung Lei,et al.  Secure rewarding schemes , 1997, Proceedings of the Thirtieth Hawaii International Conference on System Sciences.

[25]  M. Rabin DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .

[26]  Amos Fiat,et al.  How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.

[27]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[28]  David Naccache,et al.  On blind signatures and perfect crimes , 1992, Comput. Secur..

[29]  Amos Fiat,et al.  Untraceable Electronic Cash , 1990, CRYPTO.

[30]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .