Scheduled System Maintenance:
On Monday, April 27th, IEEE Xplore will undergo scheduled maintenance from 1:00 PM - 3:00 PM ET (17:00 - 19:00 UTC). No interruption in service is anticipated.
By Topic

Security Analysis of a Proxy Blind Signature Scheme Based on ECDLP

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Xuan Yang ; Inst. of Electron. Technol., Inf. Eng. Univ., Zhengzhou ; Zhaoping Yu

Proxy blind signature, which combines the properties of both proxy signature and blind signature, is useful in many applications. Based on ECLDP, Wang et al. recently proposed a proxy blind signature scheme. In this paper, we present a security analysis on Wang's scheme and prove it does not possess the strong nonrepudiation, strong unforgeability and unlink- ability properties by three efficient attacks. Furthermore, we propose an improved proxy blind scheme to remedy the weaknesses of Wang et al.'s scheme. The security and performance of the improved scheme are also analyzed.

Published in:

Wireless Communications, Networking and Mobile Computing, 2008. WiCOM '08. 4th International Conference on

Date of Conference:

12-14 Oct. 2008