Advances in Computer Science and Information Technology. Computer Science and Engineering. Second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012. Proceedings, Part II

Research Article

Security Analysis of Proxy Blind Signature Scheme Based on Factoring and ECDLP

Download
226 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-27308-7_10,
        author={Namita Tiwari and Sahadeo Padhye},
        title={Security Analysis of Proxy Blind Signature Scheme Based on Factoring and ECDLP},
        proceedings={Advances in Computer Science and Information Technology. Computer Science and Engineering. Second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012. Proceedings, Part II},
        proceedings_a={CCSIT PATR II},
        year={2012},
        month={11},
        keywords={Proxy Signature Blind Signature Elliptic Curve Discrete-log problem Integer Factorization},
        doi={10.1007/978-3-642-27308-7_10}
    }
    
  • Namita Tiwari
    Sahadeo Padhye
    Year: 2012
    Security Analysis of Proxy Blind Signature Scheme Based on Factoring and ECDLP
    CCSIT PATR II
    Springer
    DOI: 10.1007/978-3-642-27308-7_10
Namita Tiwari1,*, Sahadeo Padhye1,*
  • 1: Motilal Nehru National Institute of Technology
*Contact email: namita.mnnit@gmail.com, sahadeomathrsu@gmail.com

Abstract

Proxy blind Signature is a digital signature where an original signer delegates his/her signing capability to a proxy signer who performs message signing blindly, on behalf of original signer but he cannot make a linkage between the blind signature and the identity of the message’s owner. Recently, Qi et al proposed an improved proxy blind signature scheme based on factoring and elliptic curve discrete log problem (ECDLP). In this paper we show that Qi et al’s scheme does not hold the identifiability and unlinkability properties. Moreover, we also point out that their scheme is not secure against universal forgery attack. Furthermore, we propose an improved proxy blind signature scheme to remedy the weaknesses of Qi et al.’s scheme. The security and performance of the improved scheme are also analyzed.