Restrictive partially blind signature for resource-constrained information systems

被引:0
|
作者
Weidong Qiu
Zheng Gong
Bozhong Liu
Yu Long
Kefei Chen
机构
[1] Shanghai Jiaotong University,School of Information Security Engineering
[2] University of Twente,Distributed and Embedded Security Group, Faculty of EEMCS
[3] Shanghai Jiaotong University,Department of Computer Science and Engineering
来源
关键词
Linear feedback shift register sequence; Partially blind signature; Restrictiveness; Electronic cash;
D O I
暂无
中图分类号
学科分类号
摘要
Restrictive partially blind signature, which is designed for privacy-oriented information systems, allows a user to obtain a blind signature from a signer while the blind message must obey some certain rules. In order to reduce storage and communication costs, several public-key cryptosystems are constructed using characteristic sequences generated by linear feedback shift register (LFSR). In this paper, we present a new partially blind signature scheme with the restrictive property, which is based on nth order characteristic sequences generated by LFSR. By assuming the intractability of the discrete logarithm problem, our sequence-based schemes are provably secure in the random oracle model. We also present a practical e-cash application based on our restrictive partially blind signature. Due to the reduced representation of finite field elements and feasible sequence operations from LFSR, our scheme is time- and storage-efficient on both of signer and user sides. The advantages will make privacy-oriented applications more practical for resource-constrained devices.
引用
收藏
页码:87 / 103
页数:16
相关论文
共 50 条
  • [1] Restrictive partially blind signature for resource-constrained information systems
    Qiu, Weidong
    Gong, Zheng
    Liu, Bozhong
    Long, Yu
    Chen, Kefei
    [J]. KNOWLEDGE AND INFORMATION SYSTEMS, 2011, 26 (01) : 87 - 103
  • [2] A simpler restrictive partially blind signature
    Wang, Changji
    Xuan, Hennong
    [J]. 2006 1ST INTERNATIONAL SYMPOSIUM ON PERVASIVE COMPUTING AND APPLICATIONS, PROCEEDINGS, 2006, : 519 - +
  • [3] An Information-Theoretic Model for Resource-Constrained Systems
    Geng, Yanhui
    Lam, Albert Y. S.
    Li, Victor O. K.
    [J]. IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC 2010), 2010,
  • [4] A certificateless restrictive partially blind signature scheme
    Wang, Changji
    Lu, Rongbo
    [J]. 2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 279 - +
  • [5] Partitioning Techniques for Partially Protected Caches in Resource-Constrained Embedded Systems
    Lee, Kyoungwoo
    Shrivastava, Aviral
    Dutt, Nikil
    Venkatasubramanian, Nalini
    [J]. ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, 2010, 15 (04)
  • [6] A New Restrictive Partially Blind Signature with Designated Verifier
    Xu, Guosheng
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, 2008, : 123 - 126
  • [7] Efficient ID-based (restrictive) partially blind signature
    Cui, Wei
    Xin, Yang
    Hu, Cheng-Yu
    Yang, Yi-Xian
    Li, Zhong-Xian
    [J]. Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2008, 31 (04): : 53 - 57
  • [8] RESOURCE-CONSTRAINED VERSUS DEMAND-CONSTRAINED SYSTEMS
    KORNAI, J
    [J]. ECONOMETRICA, 1979, 47 (04) : 801 - 819
  • [9] Analysis and Improvement of a Certificateless Signature Scheme for Resource-Constrained Scenarios
    Xu, Zhiyan
    Luo, Min
    Khan, Muhammad Khurram
    Choo, Kim-Kwang Raymond
    He, Debiao
    [J]. IEEE COMMUNICATIONS LETTERS, 2021, 25 (04) : 1074 - 1078
  • [10] An efficient ID-based restrictive partially blind signature scheme
    Hu, Xiaoming
    Huang, Shangteng
    [J]. SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 205 - +