Linkability analysis of some blind signature schemes

被引:1
|
作者
Zhang, Jianhong [1 ]
机构
[1] Peking Univ, Inst Comp Sci & Technol, Beijing 100871, Peoples R China
关键词
D O I
10.1109/ICCIAS.2006.295283
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Blind signature allows a user to obtain signatures from an authority on any document, in such a way that the authority learns nothing about the message that is being signed. The blindness is an important property which distinguishes the blind signature from other signature schemes. In this work, we analyze security of two ID-based blind signature schemes [4, 7] and a blind signature scheme. [5] based on witness indistinguishable signature, and show that the they don't satisfy blindness. It means that the three blind signature schemes are insecure.
引用
收藏
页码:1367 / 1370
页数:4
相关论文
共 50 条
  • [1] Linkability analysis of some blind signature schemes
    Zhang, Jianhong
    Mao, Jian
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 556 - 566
  • [2] Linkability of some blind signature schemes
    Heng, Swee-Huay
    Yap, Wun-She
    Khoo, Khoongming
    [J]. INFORMATION SECURITY THEORY AND PRACTICES: SMART CARDS, MOBILE AND UBIQUITOUS COMPUTING SYSTEMS, PROCEEDINGS, 2007, 4462 : 80 - +
  • [3] Linkability of two blind signature schemes
    Zhang, Jianhong
    Zou, Wei
    [J]. ICICIC 2006: FIRST INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING, INFORMATION AND CONTROL, VOL 1, PROCEEDINGS, 2006, : 468 - +
  • [4] On the linkability of some group signature schemes
    Sun, HM
    Yeh, HT
    Hwang, TL
    [J]. INFORMATICA, 2003, 14 (01) : 85 - 94
  • [5] Analysis of Sun et al.'s linkability attack on some proxy blind signature schemes
    Wu, LC
    Yeh, YS
    Liu, TS
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2006, 79 (02) : 176 - 179
  • [6] On the Linkability and Security Analysis of Two Schnorr-Type Blind Signature Schemes
    Zhang, Jianhong
    Chen, Hua
    Gao, Shengnan
    [J]. EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 286 - 291
  • [7] On the Linkability of Two Schnorr Type ID-based Blind Signature Schemes
    Zhang Jianhong
    Chen Hua
    Gao Shengnan
    Geng Qin
    [J]. 2009 INTERNATIONAL FORUM ON COMPUTER SCIENCE-TECHNOLOGY AND APPLICATIONS, VOL 2, PROCEEDINGS, 2009, : 265 - 269
  • [8] On the security of some proxy blind signature schemes
    Sun, HM
    Hsieh, BT
    Tseng, SM
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2005, 74 (03) : 297 - 302
  • [9] Linkability of a blind signature scheme and its improved scheme
    Zhang, Jianhong
    Wei, Tao
    Zhang, JianYu
    Zou, Wei
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 4, 2006, 3983 : 262 - 270
  • [10] Cryptanalysis and Improvement of Some Quantum Proxy Blind Signature Schemes
    Long Zhang
    Shuang Li
    Ke-Jia Zhang
    Hong-Wei Sun
    [J]. International Journal of Theoretical Physics, 2019, 58 : 1047 - 1059