Restrictive partially blind signature for resource-constrained information systems

被引:2
|
作者
Qiu, Weidong [1 ]
Gong, Zheng [2 ]
Liu, Bozhong [1 ]
Long, Yu [3 ]
Chen, Kefei [3 ]
机构
[1] Shanghai Jiao Tong Univ, Sch Informat Secur Engn, Shanghai 200030, Peoples R China
[2] Univ Twente, Distributed & Embedded Secur Grp, Fac EEMCS, NL-7500 AE Enschede, Netherlands
[3] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200030, Peoples R China
基金
美国国家科学基金会;
关键词
Linear feedback shift register sequence; Partially blind signature; Restrictiveness; Electronic cash; BILINEAR PAIRINGS; SECURITY;
D O I
10.1007/s10115-009-0273-4
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Restrictive partially blind signature, which is designed for privacy-oriented information systems, allows a user to obtain a blind signature from a signer while the blind message must obey some certain rules. In order to reduce storage and communication costs, several public-key cryptosystems are constructed using characteristic sequences generated by linear feedback shift register (LFSR). In this paper, we present a new partially blind signature scheme with the restrictive property, which is based on nth order characteristic sequences generated by LFSR. By assuming the intractability of the discrete logarithm problem, our sequence-based schemes are provably secure in the random oracle model. We also present a practical e-cash application based on our restrictive partially blind signature. Due to the reduced representation of finite field elements and feasible sequence operations from LFSR, our scheme is time- and storage-efficient on both of signer and user sides. The advantages will make privacy-oriented applications more practical for resource-constrained devices.
引用
收藏
页码:87 / 103
页数:17
相关论文
共 50 条
  • [1] Restrictive partially blind signature for resource-constrained information systems
    Weidong Qiu
    Zheng Gong
    Bozhong Liu
    Yu Long
    Kefei Chen
    [J]. Knowledge and Information Systems, 2011, 26 : 87 - 103
  • [2] A simpler restrictive partially blind signature
    Wang, Changji
    Xuan, Hennong
    [J]. 2006 1ST INTERNATIONAL SYMPOSIUM ON PERVASIVE COMPUTING AND APPLICATIONS, PROCEEDINGS, 2006, : 519 - +
  • [3] An Information-Theoretic Model for Resource-Constrained Systems
    Geng, Yanhui
    Lam, Albert Y. S.
    Li, Victor O. K.
    [J]. IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC 2010), 2010,
  • [4] A certificateless restrictive partially blind signature scheme
    Wang, Changji
    Lu, Rongbo
    [J]. 2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 279 - +
  • [5] Partitioning Techniques for Partially Protected Caches in Resource-Constrained Embedded Systems
    Lee, Kyoungwoo
    Shrivastava, Aviral
    Dutt, Nikil
    Venkatasubramanian, Nalini
    [J]. ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, 2010, 15 (04)
  • [6] A New Restrictive Partially Blind Signature with Designated Verifier
    Xu, Guosheng
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, 2008, : 123 - 126
  • [7] Efficient ID-based (restrictive) partially blind signature
    Cui, Wei
    Xin, Yang
    Hu, Cheng-Yu
    Yang, Yi-Xian
    Li, Zhong-Xian
    [J]. Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2008, 31 (04): : 53 - 57
  • [8] RESOURCE-CONSTRAINED VERSUS DEMAND-CONSTRAINED SYSTEMS
    KORNAI, J
    [J]. ECONOMETRICA, 1979, 47 (04) : 801 - 819
  • [9] Analysis and Improvement of a Certificateless Signature Scheme for Resource-Constrained Scenarios
    Xu, Zhiyan
    Luo, Min
    Khan, Muhammad Khurram
    Choo, Kim-Kwang Raymond
    He, Debiao
    [J]. IEEE COMMUNICATIONS LETTERS, 2021, 25 (04) : 1074 - 1078
  • [10] An efficient ID-based restrictive partially blind signature scheme
    Hu, Xiaoming
    Huang, Shangteng
    [J]. SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 205 - +