A blind signature scheme based on ElGamal signature

被引:13
|
作者
Mohammed, E [1 ]
Emarah, AE [1 ]
El-Shennawy, K [1 ]
机构
[1] Arab Acad Sci & Technol, Mil Tech Coll, Cairo, Egypt
关键词
D O I
10.1109/EURCOM.2000.874771
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a new generalized blind signature scheme based on EIGamal signatures. This new scheme has a valuable property that assures that if a message is signed multiple times the corresponding signatures Hill be different. This adds to the anonymity of the blinded signatures. Public Key Cryptosystems are beneficial In encryption as well as signing which plays an essential role In electronic banking and financial transactions. The current research introduces a generalized signature scheme that could be used to generate blinded signatures as well as ordinary EIGamal signatures. The new scheme is found to be comparable to the RSA blinding. Moreover, the new scheme has the advantage of having less computational complexity and is raster than RSA in the blinding procedure.
引用
收藏
页码:51 / 53
页数:3
相关论文
共 50 条
  • [1] Security analysis on a blind signature scheme based on Elgamal signature equation
    Yu Eaozheng
    Xu Congwei
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 741 - 744
  • [2] Cryptanalysis of a blind signature scheme based on the ELGamal signatures
    School of Management, Hefei University of Technology, Hefei 230009, China
    Zhongshan Daxue Xuebao, 2006, SUPPL. (38-40):
  • [3] On Elgamal signature scheme
    Kuo, Wen-Chung
    PROCEEDINGS OF FUTURE GENERATION COMMUNICATION AND NETWORKING, WORKSHOP PAPERS, VOL 2, 2007, : 151 - 153
  • [4] A New Proxy Signature Scheme As Secure As ElGamal Signature
    Han, Song
    Chang, Elizabeth
    Wang, Jie
    Liu, Wanquan
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 6, 2005, : 286 - 290
  • [5] Ring signature based on ElGamal signature
    Ren, Jian
    Harn, Lein
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PROCEEDINGS, 2006, 4138 : 445 - 456
  • [6] ENHANCING THE SECURITY OF ELGAMAL SIGNATURE SCHEME
    HE, J
    KIESLER, T
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1994, 141 (04): : 249 - 252
  • [7] Fault cryptanalysis of ElGamal signature scheme
    Biernat, J
    Nikodem, M
    COMPUTER AIDED SYSTEMS THEORY - EUROCAST 2005, 2005, 3643 : 327 - 336
  • [8] Cryptanalysis of the enhanced ElGamal's signature scheme
    Laih, CS
    Kuo, WC
    CRYPTOGRAPHY: POLICY AND ALGORITHMS, 1996, 1029 : 228 - 231
  • [9] ElGamal signature scheme immune to fault analysis
    Nikodem, Maciej
    DEPCOS - RELCOMEX 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DEPENDABILITY OF COMPUTER SYSTEMS, 2008, : 355 - 362
  • [10] Efficient remote user authentication scheme based on generalized ElGamal signature scheme
    Yoon, EJ
    Ryu, EK
    Yoo, KY
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) : 568 - 570