Security Analysis on a Blind Signature Scheme Based on Elgamal Signature Equation

Author(s):  
Yu Baozheng ◽  
Xu Congwei
2010 ◽  
Vol 20-23 ◽  
pp. 505-511
Author(s):  
Xuan Wu Zhou

Compared with symmetric cryptosystem, asymmetric cryptosystem has much superiority in many application cases. Yet, the computation in a public key cryptosystem is much more complex than symmetric cryptosystem. In the paper, we applied HCC (Hyper-elliptic Curves Cryptosystem) as a typical fast public key cryptosystem into the designing of efficient blind signature scheme and presented an improved blind signature with fast cryptography algorithms. By utilizing probabilistic blinding algorithm, the scheme renders effective protection for the secrecy of original user, the signature generator or outer adversaries can not attack the secret message via the blinded information with effective polynomial algorithms. The scheme avoids the relevance between different signatures and interim parameters from the same original user, thus it effectively prevents signature forgery and replay attack. As security analysis for the scheme, we presented similar blind signature without relevant improving algorithms based on discrete logarithm cryptosystem. The analysis and comparison with other schemes both justify the security, reliability and high efficiency of the improved blind signature scheme regarding software and hardware application environment.


2014 ◽  
Vol 556-562 ◽  
pp. 5644-5647
Author(s):  
Wei Gao

The paper analyzes a forward-secure group blind signature scheme based on the Chinese remainder theorem in cryptographic method, and points out that the attackers can tamper with the parameters of signature algorithm easily, which causes that the attackers revoke legal group members randomly .At the same time, the article proves the scheme does not have the feature of the blind signature .At last the author comes to a conclusion that the scheme is not safe.


2010 ◽  
Vol 30 (10) ◽  
pp. 2687-2690
Author(s):  
Ming-xiang LI ◽  
Xiu-ming ZHAO ◽  
Hong-tao WANG

2011 ◽  
Vol 30 (12) ◽  
pp. 3341-3342
Author(s):  
Chun-yan WEI ◽  
Xiao-qiu CAI

Sign in / Sign up

Export Citation Format

Share Document