A Proxy Blind Signature Scheme Based on DLP

The security of the proxy blind signature scheme based on DLP which is proposed by Tan et al is analyzed, and it is found that this scheme doesn't satisfy the unforgeability requirement. The original signer and the receivers can both forge a valid proxy blind signature on any message. At the same time, the proxy signer can make a linkage between the signature on message and the signature on corresponding blind message, which is called linkability. An improved proxy blind signature scheme is proposed, which can not only overcome the security problems existing in Tan et al's scheme, but also has the property of high efficiency.

[1]  Zuowen Tan,et al.  Digital Proxy Blind Signature Schemes Based on DLP and ECDLP , 2002 .

[2]  Zuhua Shao,et al.  Improvement of threshold proxy signature scheme , 2004, Comput. Stand. Interfaces.

[3]  Reihaneh Safavi-Naini,et al.  New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairing , 2003, IACR Cryptol. ePrint Arch..

[4]  Zuo Li-ming A Proxy Blind Signature Scheme Based on The Discrete Logarithm Problem , 2007 .

[5]  Shuhong Wang,et al.  New Efficient Proxy Blind Signature Scheme Using Verifiable Self-certified Public Key , 2007, Int. J. Netw. Secur..

[6]  Amos Fiat,et al.  Untraceable Electronic Cash , 1990, CRYPTO.

[7]  Eiji Okamoto,et al.  Proxy signatures for delegating signing operation , 1996, CCS '96.

[8]  Xu Zhong,et al.  An efficient ECDSA-based signature scheme for wireless networks , 2006, Wuhan University Journal of Natural Sciences.

[9]  Hung-Min Sun,et al.  Digital multisignature schemes for authenticating delegates in mobile code systems , 2000, IEEE Trans. Veh. Technol..

[10]  Stefan BrandsCWI,et al.  Untraceable Oo-line Cash in Wallets with Observers , 1993 .

[11]  Wang Xiao An Anonymity-Revoking Blind Proxy Signature Scheme , 2003 .

[12]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[13]  Congwei Xu,et al.  A proxy blind signature scheme based on DLP , 2006, Wuhan University Journal of Natural Sciences.

[14]  David Chaum,et al.  Blind Signatures for Untraceable Payments , 1982, CRYPTO.

[15]  Kan Zhang,et al.  Threshold Proxy Signature Schemes , 1997, ISW.

[16]  Byoungcheon Lee,et al.  Strong Proxy Signature and its Applications , 2000 .