ID-based Weak Blind Signature From Bilinear Pairings

In a blind signature scheme, the user can get a signature sig(m) on message m generated from the signer's blind signature sig(m') on blinded message m', but the signer can't know the contents of the message m. When the signature sig(m) is revealed to public after that have been signed, if the signer can find the linkage between the signature sig(m) and the blind signature sig(m') on blinded message m, the signature is called as weak blind signature, otherwise, called as strong blind signature. In this paper, by using the bilinear pairings, a new ID-based weak blind signature was proposed, which is based on the Discrete Logarithm Problem and Gap Diffie-Hellman Problem. The proposed scheme use ID-based public key instead of public key of digital certification, can effectively simplify the procedure of public key management and reduce the disk storage space. In addition, by choosing different equations, we gained corresponding weak blind signature schemes respectively. Finally, the security of the proposed scheme was discussed.

[1]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[2]  Florian Hess,et al.  Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.

[3]  Alexandra Boldyreva,et al.  Efficient threshold signature , multisignature and blind signature schemes based on the Gap-Diffie-Hellman-group signature scheme , 2002 .

[4]  Claus-Peter Schnorr,et al.  Security of Blind Discrete Log Signatures against Interactive Attacks , 2001, ICICS.

[5]  Hovav Shacham,et al.  Short Signatures from the Weil Pairing , 2001, J. Cryptol..

[6]  Kwangjo Kim,et al.  Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings , 2003, ACISP.

[7]  Siu-Ming Yiu,et al.  Two Improved Partially Blind Signature Schemes from Bilinear Pairings , 2005, ACISP.

[8]  A. Shamm Identity-based cryptosystems and signature schemes , 1985 .

[9]  Kwangjo Kim,et al.  ID-Based Blind Signature and Ring Signature from Pairings , 2002, ASIACRYPT.

[10]  Xiaofeng Chen,et al.  On the Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature , 2007, IACR Cryptol. ePrint Arch..

[11]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[12]  David Chaum,et al.  Blind Signatures for Untraceable Payments , 1982, CRYPTO.

[13]  Jung Hee Cheon,et al.  An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.

[14]  Li Zhong-xian Efficient ID-Based (Restrictive) Partially Blind Signature , 2008 .

[15]  Rafail Ostrovsky,et al.  Security of blind digital signatures , 1997 .