Research Article
Security Analysis of Proxy Blind Signature Scheme Based on Factoring and ECDLP
@INPROCEEDINGS{10.1007/978-3-642-27308-7_10, author={Namita Tiwari and Sahadeo Padhye}, title={Security Analysis of Proxy Blind Signature Scheme Based on Factoring and ECDLP}, proceedings={Advances in Computer Science and Information Technology. Computer Science and Engineering. Second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012. Proceedings, Part II}, proceedings_a={CCSIT PATR II}, year={2012}, month={11}, keywords={Proxy Signature Blind Signature Elliptic Curve Discrete-log problem Integer Factorization}, doi={10.1007/978-3-642-27308-7_10} }
- Namita Tiwari
Sahadeo Padhye
Year: 2012
Security Analysis of Proxy Blind Signature Scheme Based on Factoring and ECDLP
CCSIT PATR II
Springer
DOI: 10.1007/978-3-642-27308-7_10
Abstract
Proxy blind Signature is a digital signature where an original signer delegates his/her signing capability to a proxy signer who performs message signing blindly, on behalf of original signer but he cannot make a linkage between the blind signature and the identity of the message’s owner. Recently, Qi et al proposed an improved proxy blind signature scheme based on factoring and elliptic curve discrete log problem (ECDLP). In this paper we show that Qi et al’s scheme does not hold the identifiability and unlinkability properties. Moreover, we also point out that their scheme is not secure against universal forgery attack. Furthermore, we propose an improved proxy blind signature scheme to remedy the weaknesses of Qi et al.’s scheme. The security and performance of the improved scheme are also analyzed.