Fast Public key Cryptosystem Based Blind Signature Scheme

被引:0
|
作者
Zhou, Xuanwu [1 ]
机构
[1] Command Coll Chinese Armed Police Force, Tianjin 300171, Peoples R China
关键词
Fast asymmetric cryptosystem; blind signature; probabilistic blinding; Hyper-elliptic curves; replay attack; PARALLEL INTERFERENCE CANCELLATION; DS-CDMA;
D O I
10.4028/www.scientific.net/AMM.20-23.505
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Compared with symmetric cryptosystem, asymmetric cryptosystem has much superiority in many application cases. Yet, the computation in a public key cryptosystem is much more complex than symmetric cryptosystem. In the paper, we applied HCC (Hyper-elliptic Curves Cryptosystem) as a typical fast public key cryptosystem into the designing of efficient blind signature scheme and presented an improved blind signature with fast cryptography algorithms. By utilizing probabilistic blinding algorithm, the scheme renders effective protection for the secrecy of original user, the signature generator or outer adversaries can not attack the secret message via the blinded information with effective polynomial algorithms. The scheme avoids the relevance between different signatures and interim parameters from the same original user, thus it effectively prevents signature forgery and replay attack. As security analysis for the scheme, we presented similar blind signature without relevant improving algorithms based on discrete logarithm cryptosystem. The analysis and comparison with other schemes both justify the security, reliability and high efficiency of the improved blind signature scheme regarding software and hardware application environment.
引用
收藏
页码:505 / 511
页数:7
相关论文
共 50 条
  • [41] A non-repudiable bitstring commitment scheme based on a public-key cryptosystem
    Castellà-Roca, J
    Domingo-Ferrer, J
    [J]. ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, PROCEEDINGS, 2004, : 778 - 780
  • [42] Cryptanalysis of a fast public key cryptosystem presented at SAC '91
    Nguyen, P
    Stern, J
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 1999, 1556 : 213 - 218
  • [43] FAST AUTHENTICATION IN A TRAPDOOR-KNAPSACK PUBLIC KEY CRYPTOSYSTEM
    SCHOBI, P
    MASSEY, JL
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1983, 149 : 289 - 306
  • [44] FAST DECIPHERMENT ALGORITHM FOR RSA PUBLIC-KEY CRYPTOSYSTEM
    QUISQUATER, JJ
    COUVREUR, C
    [J]. ELECTRONICS LETTERS, 1982, 18 (21) : 905 - 907
  • [45] A public key cryptosystem based on sparse polynomials
    Grant, D
    Krastev, K
    Lieman, D
    Shparlinski, I
    [J]. CODING THEORY, CRYPTOGRAPHY AND RELATED AREAS, 2000, : 114 - 121
  • [46] A Hash-Based Public Key Cryptosystem
    Yin, Qian
    Luo, Gang
    [J]. CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 383 - 392
  • [48] A new public key cryptosystem based on matrices
    Alvarez, Rafael
    Martinez, Francisco-Miguel
    Vicent, Jose-Francisco
    Zamora, Antonio
    [J]. PROCEEDINGS OF THE 6TH WSEAS INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND PRIVACY (ISP '07): ADVANCED TOPICS IN INFORMATION SECURITY AND PRIVACY, 2007, : 36 - 39
  • [49] A PUBLIC KEY CRYPTOSYSTEM BASED ON LYNDON WORDS
    SIROMONEY, R
    MATHEW, L
    [J]. INFORMATION PROCESSING LETTERS, 1990, 35 (01) : 33 - 36
  • [50] New Public Key Cryptosystem Based on Quaternions
    Durcheva, Mariana
    Karailiev, Kristian
    [J]. PROCEEDINGS OF THE 43RD INTERNATIONAL CONFERENCE APPLICATIONS OF MATHEMATICS IN ENGINEERING AND ECONOMICS (AMEE'17), 2017, 1910