Provably-secure electronic cash based on certificateless partially-blind signatures

We extend the partially-blind signature approach into certificateless public key cryptography to eliminate the key escrow problem that occurs with identities in public key cryptography. We also formalize conditions for security for certificateless partially-blind signature schemes. We also present a practical certificateless partially-blind signature scheme to make electronic cash untraceable. We prove the scheme to be unforgeable in the face of message attacks under the computational Diffie-Hellman assumption.

[1]  Jacques Stern,et al.  Security Proofs for Signature Schemes , 1996, EUROCRYPT.

[2]  Kefei Chen,et al.  Efficient Identity-Based Signatures and Blind Signatures , 2005, CANS.

[3]  Lei Zhang,et al.  Certificateless Partially Blind Signatures , 2009, 2009 First International Conference on Information Science and Engineering.

[4]  Jan Camenisch,et al.  Compact E-Cash , 2005, EUROCRYPT.

[5]  Lei Zhang,et al.  On the security of a certificateless signature scheme , 2010, 2010 2nd International Conference on Signal Processing Systems.

[6]  Kwangjo Kim,et al.  ID-Based Blind Signature and Ring Signature from Pairings , 2002, ASIACRYPT.

[7]  Yi Mu,et al.  On the Security of Certificateless Signature Schemes from Asiacrypt 2003 , 2005, CANS.

[8]  Mihir Bellare,et al.  Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.

[9]  Kwangjo Kim,et al.  Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings , 2003, ACISP.

[10]  Lei Zhang,et al.  A New Provably Secure Certificateless Signature Scheme , 2008, 2008 IEEE International Conference on Communications.

[11]  Xiaotie Deng,et al.  Key Replacement Attack Against a Generic Construction of Certificateless Signature , 2006, ACISP.

[12]  Kenneth G. Paterson,et al.  Certificateless Encryption Schemes Strongly Secure in the Standard Model , 2008, Public Key Cryptography.

[13]  Yi Mu,et al.  Malicious KGC attacks in certificateless cryptography , 2007, ASIACCS '07.

[14]  Masayuki Abe,et al.  How to Date Blind Signatures , 1996, ASIACRYPT.

[15]  Yi Mu,et al.  Compact E-Cash from Bounded Accumulator , 2007, CT-RSA.

[16]  Georg Fuchsbauer,et al.  Transferable Constant-Size Fair E-Cash , 2009, IACR Cryptol. ePrint Arch..

[17]  Duncan S. Wong,et al.  Certificateless Public-Key Signature: Security Model and Efficient Construction , 2006, ACNS.

[18]  David Chaum,et al.  Blind Signatures for Untraceable Payments , 1982, CRYPTO.

[19]  Tatsuaki Okamoto,et al.  Single-Term Divisible Electronic Coins , 1994, EUROCRYPT.

[20]  Tatsuaki Okamoto,et al.  Provably Secure Partially Blind Signatures , 2000, CRYPTO.

[21]  Silvio Micali,et al.  Everything Provable is Provable in Zero-Knowledge , 1990, CRYPTO.

[22]  Sébastien Canard,et al.  Multiple Denominations in E-cash with Compact Transaction Data , 2010, Financial Cryptography.

[23]  Siu-Ming Yiu,et al.  Two Improved Partially Blind Signature Schemes from Bilinear Pairings , 2005, ACISP.

[24]  Radu Sion,et al.  Conditional E-Cash , 2007, Financial Cryptography.

[25]  David Chaum,et al.  Online Cash Checks , 1990, EUROCRYPT.

[26]  Rafail Ostrovsky,et al.  Security of blind digital signatures , 1997 .

[27]  Rongbo Lu,et al.  A Certificateless Restrictive Partially Blind Signature Scheme , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[28]  Sébastien Canard,et al.  Divisible E-Cash Systems Can Be Truly Anonymous , 2007, EUROCRYPT.

[29]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[30]  Yi Mu,et al.  Certificateless Signature Revisited , 2007, ACISP.

[31]  Josep Domingo-Ferrer,et al.  Simulatable certificateless two-party authenticated key agreement protocol , 2010, Inf. Sci..

[32]  David Chaum,et al.  Security without identification: transaction systems to make big brother obsolete , 1985, CACM.

[33]  Amos Fiat,et al.  How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.

[34]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[35]  Jacques Stern,et al.  Provably Secure Blind Signature Schemes , 1996, ASIACRYPT.

[36]  C. E. Veni Madhavan,et al.  An Online, Transferable E-Cash Payment System , 2000, INDOCRYPT.