J4

• Articles • Previous Articles     Next Articles

An ID-based proactive threshold blind signature scheme

XU Yan1,YU Jia2,LI Da-xing3   

  1. 1. Modern Educational Technology Center, Anhui University, Hefei 230039, Anhui, China;2. College of Information Engineering, Qingdao University, Qingdao 266071;3. Institute of Network Security, Shandong University, Jinan 250100
  • Received:1900-01-01 Revised:1900-01-01 Online:2006-10-24 Published:2006-10-24
  • Contact: XU Yan

Abstract: An ID-based proactive threshold blind signature scheme is presented. The signer does not know the content signed by himself, and the signed message cannot be tracked. In this scheme, the dishonest private key generator cannot impersonate any user at any time. At the same time the scheme has the property of proactive security, that is, the whole lifetime of the signature is divided into several time periods, and the shares of private key need to be renewed in each time period. However, new shares can construct the same private key as old shares. In the end, it is proved that the scheme is correct, non-forgeable and robust.

Key words: blind signature , bilinear paring, proactive security, threshold signature, ID-based signature

CLC Number: 

  • TP309
[1] CAI Jie1,2, QIN Jing1*, HAN Fei1. The equivalence of strong blind signature and unique blind signature [J]. J4, 2013, 48(05): 57-62.
[2] MA Yan, LIU Jian-wei, ZHANG Yu-fei. Threshold signature-based lightweight clustering handover scheme for Ad hoc networks [J]. J4, 2012, 47(11): 78-82.
[3] WEN Xiao-jun1,2, CAI Xue-jun1. Secure quantum voting protocol [J]. J4, 2011, 46(9): 9-13.
[4] LI Guo-wei,LI Ru-peng and LI Da-xing . Analysis and improvement of Wang threshold signature scheme [J]. J4, 2007, 42(1): 55-58 .
[5] YU Jia and LI Da-xing . Hierarchical IDbased proactive threshold signature scheme [J]. J4, 2006, 41(1): 125-129 .
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!