Traceability on Stadler et al.'s fair blind signature scheme

被引:0
|
作者
Hwang, MS
Lee, CC
Lai, YC
机构
[1] Chaoyang Univ Technol, Dept Informat Management, Taichung 413, Taiwan
[2] Natl Chiao Tung Univ, Dept Comp & Informat Sci, Hsinchu 1001, Taiwan
关键词
blind signature; digital signature; untraceability;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, Stadler et al. proposed the concept of fair blind signatures to prevent the misuse of blind signature schemes from criminals. In this article, we show the proposed scheme could not meet the untraceability property of blind signature's requirements. We point out that the proposed scheme cannot provide true blind signatures.
引用
收藏
页码:513 / 514
页数:2
相关论文
共 50 条
  • [31] Cryptanalysis of Zhou et al.'s proxy-protected signature schemes
    Park, JH
    Kang, BG
    Han, JW
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (01) : 192 - 197
  • [32] A user efficient fair blind signature scheme for untraceable electronic cash
    Fan, CI
    Lei, CL
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2002, 18 (01) : 47 - 58
  • [34] Cryptanalysis of Barni et al. watermarking scheme
    Das, TK
    Zhou, JY
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2005, PROCEEDINGS, 2005, 3797 : 197 - 208
  • [35] Author's response to Sanchez et al. entitled "On the importance of training aids and the definition of an explosive odor signature: Commentary on Kranz et al.''
    Kranz, William
    Goodpaster, John
    [J]. FORENSIC SCIENCE INTERNATIONAL, 2015, 251 : E20 - E21
  • [36] Improvement on Tzeng et al.'s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
    Bao, HY
    Cao, ZF
    Wang, SB
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (02) : 1419 - 1430
  • [37] Cryptanalysis of Mu et al.'s and Li et al.'s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Gopalakrishnan, Ragavendran
    Karuturi, Naga Naresh
    Rangan, C. Pandu
    [J]. INFORMATION SECURITY APPLICATIONS, 2009, 5379 : 115 - 129
  • [38] Comment on Lee J-s et al.'s identity-based designated verifer proxy signature scheme and its improvement
    Liao Da-jian
    Tang Yuan-sheng
    [J]. SMART MATERIALS AND INTELLIGENT SYSTEMS, PTS 1 AND 2, 2011, 143-144 : 753 - +
  • [39] Comments on Shao's blind signature scheme
    He, MX
    Fan, PZ
    [J]. PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PDCAT'2003, PROCEEDINGS, 2003, : 940 - 941
  • [40] Attacks and solutions of Yang et al.'s protected password changing scheme
    Yoon, EJ
    Ryu, EK
    Yoo, KY
    [J]. INFORMATICA, 2005, 16 (02) : 285 - 294