Lijuan Diao
East China Normal University, Shang Hai, 200241, China
Junzhong Gu
East China Normal University, Shang Hai, 200241, China
I-Ling Yen
University of Texas at Dallas, America
ABSTRACT
This study, for the first time, presents a proxy blind signature scheme with message recovery. The proposed scheme is based on Tan et al.s proxy blind signature scheme and Abe and Okamotos signature scheme with message recovery.When practical hash functions are used in the place of truly random functions,the scheme is almost as efficient as the existing schemes with message recovery such as Zhang et al.s scheme. And, it can be proven to be unforgeable against adaptively chosen message attacks in the random oracle model under the discrete logarithm assumption, like Abe and Okamoto scheme.
PDF References Citation
How to cite this article
Lijuan Diao, Junzhong Gu and I-Ling Yen, 2013. A New Proxy Blind Signature Scheme with Message Recovery. Information Technology Journal, 12: 6159-6163.
DOI: 10.3923/itj.2013.6159.6163
URL: https://scialert.net/abstract/?doi=itj.2013.6159.6163
DOI: 10.3923/itj.2013.6159.6163
URL: https://scialert.net/abstract/?doi=itj.2013.6159.6163
REFERENCES
- Li, J.G., Y.C. Zhang and Y.L. Zhu, 2005. A new proxy signature scheme with message recovery using self-certified public key. Wuhan Univ. J. Nat. Sci., 10: 219-222.
CrossRefDirect Link - Zhang, J.H., W. Zou, D. Chen and Y.M. Wang, 2005. On the security of a digital signature with message recovery using self-certified public key. Informatica, 29: 343-346.
Direct Link - Wu, L.C., Y.S. Yeh and T.S. Liu, 2006. Analysis of sun et al.'s linkability attack on some proxy blind signature schemes. J. Syst. Software, 79: 176-179.
CrossRefDirect Link - Abe, M. and T. Okamoto, 1999. A signature scheme with message recovery as secure as discrete logarithm. Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, November 14-18, 1999, Singapore, pp: 378-389.
CrossRef - Tseng, Y.M., J.K. Jan and H.Y. Chien, 2003. Digital signature with message recovery using self-certified public keys and its variants. Applied Math. Comput., 136: 203-214.
CrossRefDirect Link