Call for Paper - August 2022 Edition
IJCA solicits original research papers for the August 2022 Edition. Last date of manuscript submission is July 20, 2022. Read More

A Proxy to Proxy Blind Multi-Signature Scheme based on DLP

Print
PDF
IJCA Proceedings on International Conference on Emergent Trends in Computing and Communication
© 2015 by IJCA Journal
ETCC 2015 - Number 2
Year of Publication: 2015
Authors:
Subhashree Naik
Manoj Kumar Behera
Sumanjit Das

Subhashree Naik, Manoj Kumar Behera and Sumanjit Das. Article: A Proxy to Proxy Blind Multi-Signature Scheme based on DLP. IJCA Proceedings on International Conference on Emergent Trends in Computing and Communication ETCC 2015(2):32-36, September 2015. Full text available. BibTeX

@article{key:article,
	author = {Subhashree Naik and Manoj Kumar Behera and Sumanjit Das},
	title = {Article: A Proxy to Proxy Blind Multi-Signature Scheme based on DLP},
	journal = {IJCA Proceedings on International Conference on Emergent Trends in Computing and Communication},
	year = {2015},
	volume = {ETCC 2015},
	number = {2},
	pages = {32-36},
	month = {September},
	note = {Full text available}
}

Abstract

Proxy blind multi-signature , it combines the properties of proxy-signature , blind signature and multi-signature ,which has been applied in different application . In this paper, we showed a new proxy to proxy blind multi-signature based on difficulty of solving the discrete logarithm problem (DLP) which fulfill the absence of single proxy signer in Dongre's[9] scheme by delegating his signing capabilities to a designated proxy signer . Moreover, we are taking this existing scheme into a new level or in next grade in order to sign the document on behalf of group of original signers.

References

  • Behrouz A. Forouzan. 2007. Cryptography and Network Security Tata McGraw Hill.
  • David Chaum. 1982. Blind Signatures for Untraceable Payments. In CRYPTO, pages 199-203.
  • Masahiro Mambo, keisuke Usuda, and Eiji Okamoto. 1996. Proxy Signatures for Delegating Signing Operation. In CCS '96: Proceedings of the 3rd ACM conference on Computer and communications security, pages 48-57, New York, NY, USA.
  • W. D. Lin, and J. K. Jan. 2000. A security personal learning tools using a proxy blind signature scheme, Proc. of Int'1 Conf. on Chinese Language Computing, pp. 273-277.
  • K. Itakura and K. Nakamura. A Public Key Cryptosystem Suitable for Digital Multi-signatures. NEC Research and Development, (71):1-8, 1983.
  • Harn L,Xu Y. 1994. Design of Generalized ElGamal Type Digital Signature Schemes Based on the Discrete Logarithm . Electronics Letters, 30(24):2025-2026.
  • Rongxing Lu, Zhenfu Cao, and Yuan Zhou. 2005. Proxy Blind Multi-signature Scheme without a Secure Channel. Applied Mathematics and Computation, 164(1):179-187.
  • Ying Sun, Chunxiang Xu, Qi Xia, and Yong Yu . 2009. Analysis and Improvement of a Proxy Blind Multi-signature Scheme without a Secure Channel. In IAS, pages 661-664. IEEE Computer Society.
  • Sangeet Dongre and Sujata Mohanty. 2010 . A Secure and efficient Proxy Blind Multi-signature Scheme based on DLP. In Fifth International Conference on Industrial and information Systems, NIT Suratkal, Karnataka, India.