Skip to main content

A Convertible Designated Verifible Blind Multi-signcryption Scheme

  • Conference paper
Book cover Advances in Computing and Communications (ACC 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 193))

Included in the following conference series:

  • 1791 Accesses

Abstract

This paper presents a convertible blind multi-signcryption scheme without using any one-way hash function based on the security of three computationaly hard problems, namely Computationaly Diffie-hellman problem, Discrete Logarithimic Problem, Integer Factorisation problem .Only a designated verifier can verify the signcrypted text having the signcrypters public parameters. The size of the generated authenticated ciphertext is independent of the number of total participating signcrypters. The proposed scheme is convertible as it can easily produce the ordinary signcrypted text without the co-operation from the signer. The verification of the proposed scheme is less, thereby can be applicable in reallife scenarios.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Shen, Y., Xie, H., Yang, L.: The Study and Application of Group Blind Signature Scheme in E-commerce Security. IEEE, Los Alamitos (2009)

    Google Scholar 

  2. Chen, X., Zhang, F., Kim, K.: ID-Based Multi-Proxy Signature and Blind Multisignature from Bilinear Pairings. Information and Communications University(ICU), 305–732

    Google Scholar 

  3. Mohammed, E., Emarah, A.E., El-Shennawy, K.: A blind signature scheme based on Elgamal signature. In: Seventeenth National Radio Science Conference, pp. 22–24 (February 2009)

    Google Scholar 

  4. Liu, Y., Yin, X., Chen, J.: A Forward Secure Blind Signature Scheme.In: Congress on Image and Signal Processing (2008)

    Google Scholar 

  5. Lopez-Garca, L., Martnez-Ramos, L., Rodrguez-Henrquez, F.: A Comparative Performance Analysis of Several Blind Signature Schemes. In: International Conference on Electrical Engineering, Computing Science and Automatic Control, pp. 310–315 (November 2008)

    Google Scholar 

  6. Fan, C.-I., Guan, D.J., Wang, C.-I., Lin, D.-R.: Cryptanalysis of Lee-HwangYang blind signature scheme. Computer Standards and Interfaces 31, 319–320 (2009)

    Article  Google Scholar 

  7. Kang, B.: On the security of proxy blind multisignaturescheme without a secure channel. In: 2nd International Conference on Computer Engineering and Technology (2009)

    Google Scholar 

  8. Wang, C.-H., Hwang, T., Lee, N.-Y.: Comments on two group signatures. Information Processing Letters 69, 95–97 (1999)

    Article  MATH  Google Scholar 

  9. Tian, X.-X., Li, H.-J., Xu, J.-P., Wang, Y.: A Security Enforcement ID-based Partially Blind Signature Scheme. In: International Conference on Web Information Systems and Mining (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Das, S., Mohanty, S., Majhi, B. (2011). A Convertible Designated Verifible Blind Multi-signcryption Scheme. In: Abraham, A., Mauri, J.L., Buford, J.F., Suzuki, J., Thampi, S.M. (eds) Advances in Computing and Communications. ACC 2011. Communications in Computer and Information Science, vol 193. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22726-4_57

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22726-4_57

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22725-7

  • Online ISBN: 978-3-642-22726-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics