Abstract
This paper presents a convertible blind multi-signcryption scheme without using any one-way hash function based on the security of three computationaly hard problems, namely Computationaly Diffie-hellman problem, Discrete Logarithimic Problem, Integer Factorisation problem .Only a designated verifier can verify the signcrypted text having the signcrypters public parameters. The size of the generated authenticated ciphertext is independent of the number of total participating signcrypters. The proposed scheme is convertible as it can easily produce the ordinary signcrypted text without the co-operation from the signer. The verification of the proposed scheme is less, thereby can be applicable in reallife scenarios.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Shen, Y., Xie, H., Yang, L.: The Study and Application of Group Blind Signature Scheme in E-commerce Security. IEEE, Los Alamitos (2009)
Chen, X., Zhang, F., Kim, K.: ID-Based Multi-Proxy Signature and Blind Multisignature from Bilinear Pairings. Information and Communications University(ICU), 305–732
Mohammed, E., Emarah, A.E., El-Shennawy, K.: A blind signature scheme based on Elgamal signature. In: Seventeenth National Radio Science Conference, pp. 22–24 (February 2009)
Liu, Y., Yin, X., Chen, J.: A Forward Secure Blind Signature Scheme.In: Congress on Image and Signal Processing (2008)
Lopez-Garca, L., Martnez-Ramos, L., Rodrguez-Henrquez, F.: A Comparative Performance Analysis of Several Blind Signature Schemes. In: International Conference on Electrical Engineering, Computing Science and Automatic Control, pp. 310–315 (November 2008)
Fan, C.-I., Guan, D.J., Wang, C.-I., Lin, D.-R.: Cryptanalysis of Lee-HwangYang blind signature scheme. Computer Standards and Interfaces 31, 319–320 (2009)
Kang, B.: On the security of proxy blind multisignaturescheme without a secure channel. In: 2nd International Conference on Computer Engineering and Technology (2009)
Wang, C.-H., Hwang, T., Lee, N.-Y.: Comments on two group signatures. Information Processing Letters 69, 95–97 (1999)
Tian, X.-X., Li, H.-J., Xu, J.-P., Wang, Y.: A Security Enforcement ID-based Partially Blind Signature Scheme. In: International Conference on Web Information Systems and Mining (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Das, S., Mohanty, S., Majhi, B. (2011). A Convertible Designated Verifible Blind Multi-signcryption Scheme. In: Abraham, A., Mauri, J.L., Buford, J.F., Suzuki, J., Thampi, S.M. (eds) Advances in Computing and Communications. ACC 2011. Communications in Computer and Information Science, vol 193. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22726-4_57
Download citation
DOI: https://doi.org/10.1007/978-3-642-22726-4_57
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22725-7
Online ISBN: 978-3-642-22726-4
eBook Packages: Computer ScienceComputer Science (R0)