Abstract
The concept of partially blind signatures was first introduced by Abe and Fujisaki. Subsequently, in work by Abe and Okamoto, a provably secure construction was proposed along with a formalised definition for partially blind schemes. The construction was based on a witness indistinguishable protocol described by Cramer et al. and utilises a blind Schnorr signature scheme.
This paper investigates incorporating the restrictive property proposed by Brands into a partially blind signature scheme. The proposed scheme follows the construction proposed by Abe and Okamoto and makes use of Brands’ restrictive blind signature scheme.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Masayuki Abe and Jan Camenisch. Partially blind signature schemes. In Symposium on Cryptography and Information Security. IEICE, January 1997.
Masayuki Abe and Eiichiro Fujisaki. Howto date blind signatures. In Kwangjo Kim and Tsutomu Matsumoto, editors, International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT’96), volume 1163 of Lecture Notes in Computer Science, pages 244–251. Springer-Verlag, November 1996.
Masayuki Abe and Tatsuaki Okamoto. Provably secure partially blind signatures. In Mihir Bellare, editor, Advances in Cryptology—CRYPTO 2000, volume 1880 of Lecture Notes in Computer Science, pages 271–286. Springer-Verlag, 20–24 August 2000.
C. Boyd, E. Foo, and C. Pavlovski. Efficient electronic cash using batch signatures. In J. Pieprzyk, R. Safavi-Naini, and J. Seberry, editors, Australasian Conference on Information Security and Privacy (ACISP’99), volume 1587 of Lecture Notes in Computer Science, pages 244–257. Springer-Verlag, 1999.
Stefan Brands. An efficient off-line electronic cash system based on the representation problem. Technical Report CS-R9323, Centrum voor Wiskunde en Informatica (CWI), March 1993.
Stefan Brands. Untraceable off-line cash in wallets with observers. In Douglas R. Stinson, editor, Advances in Cryptology—CRYPTO’ 93, volume 773 of Lecture Notes in Computer Science, pages 302–318. Springer-Verlag, 22–26 August 1993.
A. Chan, Y. Frankel, and Y. Tsiounis. Easy come — easy go divisible cash. In Kaisa Nyberg, editor, Advances in Cryptology—EUROCRYPT 98, volume 1403 of Lecture Notes in Computer Science, pages 561–576. Springer-Verlag, 1998.
D. Chaum and T. Pryds Pedersen. Wallet databases with observers. In Ernest F. Brickell, editor, Advances in Cryptology—CRYPTO’ 92, volume 740 of Lecture Notes in Computer Science, pages 89–105. Springer-Verlag, 1993, 16–20 August 1992.
David Chaum. Blind signatures for untraceable payments. In David Chaum, Ronald L. Rivest, and Alan T. Sherman, editors, Advances in Cryptology: Proceedings of Crypto 82, pages 199–203. Plenum Press, New York and London, 1983, 23–25 August 1982.
Ronald J. F. Cramer, Ivan B. DamgĂĄrd, and L. A. M. Schoenmakers. Proofs of partial knowledge and simplified design of witness hiding protocols. In 116, page 18. Centrum voor Wiskunde en Informatica (CWI), ISSN 0169-118X, February 28 1994. AA (Department of Algorithmics and Architecture).
U. Feige and A. Shamir. Witness indistinguishable and witness hiding protocols. In Baruch Awerbuch, editor, Proceedings of the 22nd Annual ACM Symposium on the Theory of Computing, pages 416–426, Baltimore, MY, May 1990. ACM Press.
A. Juels, M. Luby, and R. Ostrovsky. Security of blind digital signatures. In Burton S. Kaliski Jr., editor, Advances in Cryptology—CRYPTO’ 97, volume 1294 of Lecture Notes in Computer Science, pages 150–164. Springer-Verlag, 17–21 August 1997.
Shingo MIYAZAKI, Masayuki ABE, and Kouichi SAKURAI. Partially blind signature schemes for the dss and for a discrete log. based message recovery signature. In Korea-Japan Joint Workshop on Information Security and Cryptology, pages 217–226, 1997.
DaeHun Nyang and JooSeok Song. Preventing double-spent coins from revealing user’s whole secret. In J.S. Song, editor, Second International Conference on Information Security and Cryptology (ICISC’99), volume 1787 of Lecture Notes in Computer Science, pages 13–20. Springer-Verlag, 1999.
T. Okamoto. Provably secure and practical identification schemes and corresponding signature schemes. In Ernest F. Brickell, editor, Advances in Cryptology—CRYPTO’ 92, volume 740 of Lecture Notes in Computer Science, pages 31–53. Springer-Verlag, 1993, 16–20 August 1992.
D. Pointcheval. Strengthened security for blind signatures. In Kaisa Nyberg, editor, Advances in Cryptology—EUROCRYPT 98, volume 1403 of Lecture Notes in Computer Science, pages 391–403. Springer-Verlag, 1998.
C. P. Schnorr. Efficient signature generation by smart cards. Journal of Cryptology, 4(3):161–174, 1991.
L. A. M. Schoenmakers. An efficient electronic payment system withstanding parallel attacks. Technical Report CS-R9522, CWI-Centrum voor Wiskunde en Informatica, March 31, 1995.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Maitland, G., Boyd, C. (2002). A Provably Secure Restrictive Partially Blind Signature Scheme. In: Naccache, D., Paillier, P. (eds) Public Key Cryptography. PKC 2002. Lecture Notes in Computer Science, vol 2274. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45664-3_7
Download citation
DOI: https://doi.org/10.1007/3-540-45664-3_7
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-43168-8
Online ISBN: 978-3-540-45664-3
eBook Packages: Springer Book Archive