Traceability on Stadler et al.'s fair blind signature scheme

被引:0
|
作者
Hwang, MS
Lee, CC
Lai, YC
机构
[1] Chaoyang Univ Technol, Dept Informat Management, Taichung 413, Taiwan
[2] Natl Chiao Tung Univ, Dept Comp & Informat Sci, Hsinchu 1001, Taiwan
关键词
blind signature; digital signature; untraceability;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, Stadler et al. proposed the concept of fair blind signatures to prevent the misuse of blind signature schemes from criminals. In this article, we show the proposed scheme could not meet the untraceability property of blind signature's requirements. We point out that the proposed scheme cannot provide true blind signatures.
引用
收藏
页码:513 / 514
页数:2
相关论文
共 50 条
  • [1] Analysis on traceability on Stadler et al.'s fair blind signature
    Lee, NY
    Sun, MK
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2003, E86A (11) : 2901 - 2902
  • [2] Cryptanalysis and improvement on Chang et al.'s signature scheme
    Wang, Qing-Long
    Han, Zhen
    Geng, Xiu-Hua
    [J]. 2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL II, PROCEEDINGS, 2007, : 112 - 114
  • [3] Cryptanalysis of Chang et al.'s signature scheme with message recovery
    Zhang, FG
    [J]. IEEE COMMUNICATIONS LETTERS, 2005, 9 (04) : 358 - 359
  • [4] New Forgery Attack on Chang et al.'s signature scheme
    Li, Kou
    Ming, Jin
    [J]. PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE AND ELECTRONICS INFORMATION (ICACSEI 2013), 2013, 41 : 5 - 6
  • [5] Attack on Chen et al.'s certificateless aggregate signature scheme
    Zhang, Jianhong
    Zhao, Xubing
    Mao, Jian
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (01) : 54 - 59
  • [6] Improvement of Yang et al.'s threshold proxy signature scheme
    Shao, Jun
    Cao, Zhenfu
    Lu, Rongxing
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2007, 80 (02) : 172 - 177
  • [7] On the security of Miyaji et al. group signature scheme
    Zhang, JH
    Wang, YM
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 167 (02) : 1373 - 1382
  • [8] Security of Lu et al.'s proxy-protected signature scheme
    Park, JH
    Kang, BG
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (02) : 1010 - 1015
  • [9] Comment on Saeednia et al.'s strong designated verifier signature scheme
    Lee, Ji-Seon
    Chang, Jik Hyun
    [J]. COMPUTER STANDARDS & INTERFACES, 2009, 31 (01) : 258 - 260
  • [10] Comment on Lee et al.’s group signature and e-auction scheme
    Yanbin Sun
    Yan Sun
    Mingxing Luo
    Lize Gu
    Shihui Zheng
    Yixian Yang
    [J]. Information Systems Frontiers, 2013, 15 : 133 - 139