CFP last date
20 December 2024
Reseach Article

An Enhanced Proxy Blind Signature with two Intractable Problems

by Manoj Kumar Chande
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 112 - Number 15
Year of Publication: 2015
Authors: Manoj Kumar Chande
10.5120/19739-1545

Manoj Kumar Chande . An Enhanced Proxy Blind Signature with two Intractable Problems. International Journal of Computer Applications. 112, 15 ( February 2015), 1-5. DOI=10.5120/19739-1545

@article{ 10.5120/19739-1545,
author = { Manoj Kumar Chande },
title = { An Enhanced Proxy Blind Signature with two Intractable Problems },
journal = { International Journal of Computer Applications },
issue_date = { February 2015 },
volume = { 112 },
number = { 15 },
month = { February },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume112/number15/19739-1545/ },
doi = { 10.5120/19739-1545 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:49:31.329439+05:30
%A Manoj Kumar Chande
%T An Enhanced Proxy Blind Signature with two Intractable Problems
%J International Journal of Computer Applications
%@ 0975-8887
%V 112
%N 15
%P 1-5
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A proxy blind signature scheme is combination of two signature schemes particularly proxy signature and blind signature. In this signature scheme the original signer delegate his/her signing authority to some other entity named proxy signer. The proxy signer signs the documents or messages, but he cannot be able to find any link between the blind signature and the identity of the signature requester. In the open literature the majority of the existing digital signature schemes were developed based on intractability of a single hard problem like integer factoring problem (IFP), discrete logarithm problem (DLP) or elliptic curve discrete logarithm problems (ECDLP). This paper analyzes Qi and Wang et al's scheme, which is based on multiple hard problems namely IFP and ECDLP. But their scheme has security weaknesses and cannot hold some of the basic properties of signature scheme. Improvements are suggested to overcome with these weaknesses, such that the proposed signature scheme satisfies the security standards of a proxy blind signature scheme. The security of the improved scheme is also analyzed, which shows that this signature scheme is more secure than that schemes based on single intractable problem.

References
  1. W. D. Lin and J. K. Jan, A security personal learning tools using a proxy blind signature scheme, Proccedings of International Conference on Chinese Language Computing, Illinois, USA, July 2000, 273–277, (2000).
  2. V. S. Miller, Use of elliptic curves in cryptography, In Advances in Cryptology-CRYPTO'85, Santa Barbara, CA, 1985, Lecture Notes in Comput. Sci. , 218, Springer-Verlag, Berlin, 417–426, (1986).
  3. N. Koblitz, Elliptic Curve Cryptosystems. Math. Comp. , 48, 203–209, (1987).
  4. R. L. Rivest, A. Shamir, and L. M. Adleman, A Method for Obtaining Digital Signatures and Public-Key Cryptosystems Communications, ACM, vol. 21, pp. 120–126, Feb. 1978.
  5. W. Diffie, M. E. Hellman, New directions in cryptography. IEEE Trans. Inform. Theory, 22(6), 644–654, (1976).
  6. Z. Tan, Z. Liu, C. Tang, Digital proxy blind signature schemes based on DLP and ECDLP, MM Research Preprints, MMRC, AMSS, Academia, Sinica, Beijing, No. 21, 212–217, (2002).
  7. S. Lal, and A. K. Awasthi, Proxy Blind Signature Scheme, Cryptology ePrint Archive, Report2003/072. Available at: http://eprint. iacr. org/.
  8. M. Mambo, K. Usuda, E. Okamoto, Proxy signatures: Delegation of the power to sign messages, IEICE Transactions Fundamentals, E79-A(9), 1338–1353, (1996).
  9. H. Y. Wang, R. C. Wang, A proxy blind signature scheme based on ECDLP, Chinese Journal of Electronics, 14(2), 281– 284, (2005).
  10. X. Yang, Z. Yu, Security Analysis of a Proxy Blind Signature Scheme Based on ECDLP, In The 4th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM 2008), 1–4, (2008).
  11. L. Hu, K. Zheng, Z. Hu and Y. Yang, A Secure Proxy Blind Signature Scheme Based on ECDLP, In 2009 International Conference on Multimedia Information Networking and Security, IEEE (2009).
  12. C. Qi, Y. Wang, An Improved Proxy Blind Signature Scheme Based on Factoring and ECDLP, In Computational Intelligence and Software Engineering, IEEE, 1–4, (2009).
  13. Blake I. F. , Seroussi G. , Smart N. P. , Elliptic curves in cryptography, London Math. Soc. Lecture Notes Ser. 265, Cambridge University Press, (1999).
Index Terms

Computer Science
Information Sciences

Keywords

Blind Signature Elliptic Curve Discrete Logarithm Problem (ECDLP) Integer Factorization Problem (IFP) Proxy Signature.