CFP last date
20 May 2024
Reseach Article

An Improved Proxy Blind Signature Scheme with Forward Security

by Manoj Kumar Chande, Balwant Singh Thakur
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 85 - Number 15
Year of Publication: 2014
Authors: Manoj Kumar Chande, Balwant Singh Thakur
10.5120/14914-3321

Manoj Kumar Chande, Balwant Singh Thakur . An Improved Proxy Blind Signature Scheme with Forward Security. International Journal of Computer Applications. 85, 15 ( January 2014), 1-4. DOI=10.5120/14914-3321

@article{ 10.5120/14914-3321,
author = { Manoj Kumar Chande, Balwant Singh Thakur },
title = { An Improved Proxy Blind Signature Scheme with Forward Security },
journal = { International Journal of Computer Applications },
issue_date = { January 2014 },
volume = { 85 },
number = { 15 },
month = { January },
year = { 2014 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume85/number15/14914-3321/ },
doi = { 10.5120/14914-3321 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:02:30.429482+05:30
%A Manoj Kumar Chande
%A Balwant Singh Thakur
%T An Improved Proxy Blind Signature Scheme with Forward Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 85
%N 15
%P 1-4
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper presents a proxy blind signature scheme with forward security mechanism. The proposed digital signature scheme combines the two special-purpose signature schemes, blind signature and proxy signature. In this signature scheme, the original signer gives authority to another entity which is known as a proxy signer, but without having any idea about the content of the document. This paper, proposes an enhanced proxy blind signature, in which the forward security is incorporated and the security of the signature scheme relies on the discrete logarithm problem (DLP). Forward security mechanism will provide protection to the system from the key leakage or key exposure, because in this mechanism, the private key of proxy signer is updated periodically. In case if the signature key at some stage is compromised, the adversary cannot be able to forge signatures as if they had been generated before the exposure or leakage of key.

References
  1. D. Chaum. Blind signatures for untraceable payments. In CRYPTO'82, pages 199–203. Plenum Press, 1983.
  2. E. Okmamoto M. Mambo K. Usuda. Proxy signatures: delegation of the power to sign message. IEICE Transaction Functional, E-79(A-9):1338–1354, 1996.
  3. Z. Liu Z. Tan and C. Tang. Digital proxy blind signature schemes based on dlp and ecdlp. MM Research Preprints, MMRC, AMSS, Academia, Sinica, Beijing, 21:212–217, 2002.
  4. J. K. Jan and W. D. Lin. A security personal learning tools using a proxy blind signature scheme. In Proccedings of International Conference on Chinese Language Computing, pages 273–277, 2000.
  5. A. K. Awasthi and S. Lal. Proxy blind signature scheme. Journal of Information Science and Engineering. 2003. Cryptology ePrint Archive, Report 2003/072, Available at < http : ==eprint:iacr:org= > :
  6. S. H. Wang F. Bao G. L. Wang and J. Wang. Cryptanalysis of a proxy blind signature scheme based on DLP. Journal of Software. 16(5):911–915, 2005.
  7. Q. Xue and C. Cao. A new proxy blind signature scheme with warrant. In Proceedings of the 2004 IEEE Conference on Cybernetics and Intelligent Systems, pages 1386–1391, 2004.
  8. J. G. Li Y. C. Zhang and S. T. Yang. Cryptanalysis of new proxy blind signature scheme with warrant. In ICCMSE'05, 2005.
  9. H. M. Sun B. T. Hsieh and S. M. Tseng. On the security of some proxy signature schemes. Journal of System and Software, 74:297–302, 2005.
  10. Lin-Chuan Wu Yi-Shiung Yeh and Tsann-Shyong Liu. Analysis of sun et al. 's linkability attack on some proxy blind signature schemes. The Journal of Systems and Software, 79:212–217, 2006.
  11. Shaobin Wang Hong Fan and Guohua Cui. A proxy blind signature schemes based dlp and applying in e-voting. In ICEC'05, pages 641–645, 2005.
  12. J. G. Li and S. H. Wang. New efficient proxy blind signature scheme using verifiable self-certified public key. International Journal of Network Security, 4(2):193–200, 2007.
  13. Mihir Bellare and Sara K. Miner. A forward-secure digital signature scheme. In CRYPTO'99, Lecture Notes in Computer Science, volume 1666, pages 431–448. Springer Verlag, 1999.
  14. R. Anderson. Invited lecture. In Proceedings of 4th ACM Conference on Computer and Communications Security, pages 1–7. ACM Press, 1997.
  15. G. Itkis and L. Reyzin. Forward–secure signature scheme with optimal signing and verifying. In Proceedings of 21st Annual International Cryptology Conference, Lecture Notes in Computer Science, volume 2139, pages 332–354. Berlin: Springer Verlag, 2001.
  16. A. Kozlov and L. Reyzin. Forward-secure digital signature scheme with fast key update. In Proceedings of Security in Communication Network, Lecture Notes in Computer Science, volume 2576, pages 247–262. Berlin: Springer Verlag, 2002.
Index Terms

Computer Science
Information Sciences

Keywords

Discrete Logarithm Problem Forward Security Proxy Blind Signature