By Topic

Security Analysis of a Proxy Blind Signature and Its Improved Scheme

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Rufen Huang ; Dept. of Comput. Sci. & Eng., Zhangzhou Normal Univ., Zhangzhou, China ; Qiang Nong

The security of Zheng et al.'s ID-based proxy blind signature scheme from bilinear pairings is analyzed, it is found that their scheme does not possess the blindness property. A dishonest proxy signer can relate the formation process of the proxy blind signature to the unblind signature for the message by gathering the corresponding message of signing protocol, and then he can trace the message holder. An improved scheme is proposed by multiplying the reverse of the blind factor to the blind message. Experimental results show that the new scheme can effectively overcome the disadvantage of the original scheme and resist the signer's malicious tracking. Furthermore, it can satisfy all the required properties of a proxy blind signature and performs better in security and practicability which can be used to build more secure system.

Published in:

Information Technology, Computer Engineering and Management Sciences (ICM), 2011 International Conference on  (Volume:2 )

Date of Conference:

24-25 Sept. 2011