1 / 10

Proxy blind multi-signature scheme without a secure channel

Proxy blind multi-signature scheme without a secure channel. Source: Applied Mathematics and Computation , vol: 164, issue: 1, May 5, 2005, pp. 179 - 187. Author: RongXing Lu, ZhenFu Cao, Yuan Zhou Speaker: Chang-Chu Chen Date: 05/26/2005. Outline. Introduction Proposed scheme

Download Presentation

Proxy blind multi-signature scheme without a secure channel

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Proxy blind multi-signature scheme without a secure channel Source: Applied Mathematics and Computation, vol: 164, issue: 1, May 5, 2005, pp. 179 - 187. Author: RongXing Lu, ZhenFu Cao, Yuan Zhou Speaker: Chang-Chu Chen Date: 05/26/2005

  2. Outline • Introduction • Proposed scheme • Conclusions

  3. Keywords • Proxy signature • a proxy signer can sign any message on behalf of the original signer • Blind signature • authenticates a message without revealing any information about the sender • Multi-signature • multiple users sign on a single message

  4. Proxy blind multi-signature • Electronic cash • Anonymous electronic voting requester Original signers Proxy signer A1 secret blind signature A2 insecure channel B … C An

  5. Notations si: secret of Ai p, q : large prime, q | p -1 g : generator of Z*p with order q xi: private key of Ai yi: public key of Ai , xB: private key of B yB: public key of B, mw: designated proxy warrant negotiated by all original signers H( ), H1( ), H2( ) : universal secure hash functions m : message : published

  6. Proxy secret key phase Original signer Ai Proxy signer B ElGamal cipher text publish randomki , k’i

  7. Signing phase Proxy signer B Requester C randomw1 randomw2 , w3 proxy blind signature (e*, y*)

  8. Validation phase

  9. Satisfied properties • Verifiability • Anyone can verify a valid signature. • Unforgeability • Only proxy signer can generate a valid proxy blind multi-signature. • Unlinkability • Only signature requester can link this signature to the requester.

  10. Conclusion • Proposed a new proxy blind multi-signature scheme without a secure channel.

More Related