Skip to main content

Message Recovery Fair Blind Signature

  • Conference paper
  • First Online:
Public Key Cryptography (PKC 1999)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1560))

Included in the following conference series:

Abstract

As the blind signature introduced by Chaum [10] does not reveal any information about the message or its signature, it has been used for providing the anonymity in secure electronic payment systems. Unfortunately, this perfect anonymity could be misused by criminals as blind signatures prevent linking the withdrawal of money and the payment made by the same customer. Therefore, we should provide publicly verifiable mechanism if it is required for the judge to trace the blackmailed messages. In this study, we propose a modified fair blind signature, which additionally provides the role of message recovery. After analyzing the existing meta-ElGamal scheme [12] suggested by Horster, the model of message recovery blind signature is considered at first. And we suggest a new fair blind signature based on the oblivious transfer protocol, with which a judge can verify its fairness. Proposed scheme can be advanced into the blind multi-signature and it is also applicable to the diverse payment applications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. W. Diffie, M. Hellman: New Directions in Cryptography, IEEE Transactions on Information Theory, Vol. IT-22, No. 6, (1976) 472–492

    MathSciNet  Google Scholar 

  2. R. L. Rivest, A. Shamir, L. Adleman: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communication of the ACM, Vol. 21, No. 2, (1978) 120–126

    Article  MATH  MathSciNet  Google Scholar 

  3. D. Chaum, A. Fiat, M. Noar: Untraceable Electronic Cash, Advances in Cryptology-Crypto’88, Lecture Notes in Computer Science, Springer-Verlag, (1990) 319–327

    Google Scholar 

  4. S. Brands: An Efficient Off-line Electronic Cash System Based on the Representation Problem, Technical Report CS-R9323, CWI, (1993)

    Google Scholar 

  5. S. Brands.: Untraceable Off-line Cash in Wallets with Observers, Advances in Cryptology-Cryptology’93, Lecture Notes in Computer Science, Vol. 773, Springer-Verlag, (1994)

    Google Scholar 

  6. B. von Solms, D. Naccache: On Blind Signatures and Perfect Crimes, Computers ans Security, Vol. 11, No. 6, (1992) 581–583

    Article  Google Scholar 

  7. E. F. Brickell, P. Gemmell, D. Kravitz: Trustee-based Tracing Extensions to Anonymous Cash and the Making of Anonymous Change, Symposium of Distributed Algorithms (SODA), (1995)

    Google Scholar 

  8. A. Fiat, A. Shamir: How to Prove Yourself: Practical Solutions of Identification and Signature Problems, Advances in Cryptology-Crypto’86, Lecture Notes in Computer Science, Vol. 263, Springer-Verlag, (1987)

    Google Scholar 

  9. T. ElGamal: A Public Key Cryptosystem and a Signature Scheme based on Discrete Logarithm, IEEE Transactions on Information Theory, Vol. IT-30, No. 4, (1985) 469–472

    Article  MathSciNet  Google Scholar 

  10. D. Chaum: Blind Signature for Untraceable Payments, Advances in Cryptology-Crypto’82, Lecture Notes in Computer Science, Springer-Verlag, (1982) 199–203

    Google Scholar 

  11. Patrick Horster, Holger Petersen: Meta Message Recovery and Meta Blind Signature Scheme Based on the Discrete Logarithm Problem and Their Applications, Advances in Cryptology-Asiacrypt’94, Lecture Notes in Computer Science, Springer-Verlag, (1994)

    Google Scholar 

  12. Patrick Horster, Markus Michels, Holger Petersen: Meta-ElGamal Signature Schemes, Proc. 2nd ACM Conference on Computer and Communications Security, Fairfax, Virginia, (1994)

    Google Scholar 

  13. Patrick Horster, Markus Michels, Holger Petersen: Efficient Blind Signature Scheme based on the Discrete Logarithm Problem, Technical Report TR-94-6-D,University of Technology Chemnitz-Zwichau,Dept. of Computer Science, (1994)

    Google Scholar 

  14. Patrick Horster, Markus Michels, Holger Petersen: Meta-Multisignature Scheme based on the Discrete Logarithm Problem, Technical Report TR-94-12-F, University of Technology Chemnitz-Zwichau, Dept. of Computer Science, (1994)

    Google Scholar 

  15. M. Rabin: How to Exchange Secrets by Oblivious Transfer, Technical Reports TR-81, Harvard Aiken Computation Laboratory, (1981)

    Google Scholar 

  16. Mihir Bellare, Silvio Micali: Non-Interactive Oblivious Transfer and Applications, Advances in Cryptology-Crypto’89, Lecture Notes in Computer Science, Vol. 435, Springer-Verlag, (1989)

    Google Scholar 

  17. S. Micali: Fair Cryptosystems, Technical Reports MIT/LCS/TR-579-b, (1993)

    Google Scholar 

  18. Markus Stadler, Jean-Marc Piveteau, Jan Camenisch: Fair Blind Signature, Advances in Cryptology-Eurocrypt’95, Lecture Notes in Computer Science, Vol. 921, Springer-Verlag, (1995)

    Google Scholar 

  19. Jan Camenisch, Jean-Marc Piveteau, Markus Stadler: An Efficient Electronic Payment System Protecting Privacy, Advances in Cryptology-Eurocrypt’94, Lecture Notes in Computer Science, Vol. 875, Springer-Verlag, (1994)

    Google Scholar 

  20. N. Asokan, Victor shoup, Michael Waidner: Optimistic Fair Exchange of Digital Signature, IBM Technical Report RZ 2973. (1997)

    Google Scholar 

  21. Holger Petersen, Guillaume Poupard: Efficient Scalable Fair Cash with Off-line Extortion Prevention, Technical Report LIENS-97-7, (1997)

    Google Scholar 

  22. Markus Stadler: Publicly Verifiable Secret Sharing, Advances in Cryptology-Eurocrypt’96, Lecture Notes in Computer Science, Springer-Verlag, (1995) 190–199

    Google Scholar 

  23. Alfred J. Menezed, Paul C. van Oorschot, Scott A. Vanstone (nted.): Handbook of Applied Cryptography, CRC Press. (1996)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 1999 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, H.W., Kim, T.Y. (1999). Message Recovery Fair Blind Signature. In: Public Key Cryptography. PKC 1999. Lecture Notes in Computer Science, vol 1560. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49162-7_8

Download citation

  • DOI: https://doi.org/10.1007/3-540-49162-7_8

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-65644-9

  • Online ISBN: 978-3-540-49162-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics