Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Secure Identity-Based Blind Signature Scheme for Online Transactions

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Today, more and more business activities are done through online transactions. How to protect the personal privacy of customers in online transactions has become an urgent issue. Blind signature (BS) is suitable for online transactions because it can hide the specific content of the signed message. The security proofs of most BS schemes are given in the random oracle model (ROM). As we all know, the cryptographic scheme that is proven to be secure in ROM may be insecure in practical applications. In this paper, we fist study the security requirements for identity-based BS (IBBS) scheme, then design a concrete IBBS scheme and show the security proofs in the standard model. Finally, we compare the proposed scheme with the other two BS schemes. Requiring only three pairing operations, the proposed scheme is much efficient and is suitable for online transactions.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  1. Chaum, D. (1983). Blind signatures for untraceable payments. Advances in Cryptology LNCS, 1440, 199–203.

    Article  Google Scholar 

  2. Chen, X., Zhang, F., & Liu, S. (2007). ID-based restrictive partially blind signatures and applications. Journal of Systems and Software, 80, 164–171.

    Article  Google Scholar 

  3. Chow, S. (2009). Blind signature and ring signature schemes: rehabilitation and attack. Computer Standards and Interfaces, 31, 707–712.

    Article  Google Scholar 

  4. Cui, W., & Jia, Q. (2019) Provably secure pairing-free identity-based restrictive partially blind signature scheme. IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference, (pp. 1038–1042).

  5. Dong, G., Gao, F., Shi, W., & Gong, P. (2014). An efficient certificateless blind signature scheme without bilinear pairing. Annals of the Brazilian Academy of Sciences, 86(2), 1003–1011.

    Article  Google Scholar 

  6. Girraj, K., & Singh, B. (2018). Efficient identity-based blind message recovery signature scheme from pairings. IET Infomation Security, 12(2), 150–156.

    Article  Google Scholar 

  7. Huang, Z., Chen, K., & Wang, Y. (2005). Efficient identity based signatures and blind signatures. International Conference on Cryptology and Network Security, LNCS, (pp. 120–133, vol. 3810).

  8. Hu, X., & Huang, S. (2010). Secure identity-based blind signature scheme in the standard model. Journal of Information Science and Engineering, 26, 215–230.

    MathSciNet  MATH  Google Scholar 

  9. He, D., Chen, J., & Zhang, R. (2011). An efficient identity-based blind signature scheme without bilinear pairings. Computers and Electrical Engineering, 37, 444–450.

    Article  Google Scholar 

  10. He, D., Zeadally, S., Kumar, N., & Wu, W. (2016). Efficient and anonymous mobile user authentication protocol using self-certified public key cryptography for multi-server architectures. IEEE Transactions on Information Forensics and Security, 11(9), 2052–2064.

    Article  Google Scholar 

  11. SK Hafizul, I., & Mohammad S, O. (2015). Design of provably secure and efficient certificateless blind signature scheme using bilinear pairing. Security and Communication Networks, 8, 4319–4332.

  12. Sk Hafizul, I., Ruhul, A., GP, B., Mohammad S, O., & Muhammad, K. (2016). Provably secure pairing-free identity-based partially blind signature scheme and its application in online e-cash system. Arabian Journal for Science and Engineering, 41(8), 3163–3176.

    Article  MathSciNet  Google Scholar 

  13. Li, R., Yu, J., Li, G., & Li, D. (2007) A new Identity-based blind signature scheme with batch verifications. International Conference on Multimedia and Ubiquitous Engineering, https://doi.org/10.1109/MUE.2007.35.

  14. Li, F., Zhang, M., & Takagi, T. (2013). Identity-based partially blind signature in the standard model for electronic cash. Mathematical and Computer Modelling, 58, 196–203.

    Article  MathSciNet  Google Scholar 

  15. Li, Q., Hsu, C., He, D., Choo, K., & Gong, P. (2020). An identity-based blind signature scheme using lattice with provable security. Mathematical Problems in Engineering, vol. 2020, Article ID 7528571:1-12.

  16. LeTrieu, P., & Wakaha, O. (2009). New identity-based blind signature and blind decryption scheme in the standard model. IEICE Transactions on Fundamentals of Electronics Communications and computer Sciences, LNCS, (pp. 1822–1835, vol. E92A, no. 8).

  17. Lourdes, L., Luis, J., & Francisco, R. (2014). A pairing-based blind signature e-voting scheme. Computer Journal, 57(10), 1460–1471.

    Article  Google Scholar 

  18. Moldovyan, N. (2010). Blind collective signature scheme based on discrete logarithm problem. International Journal of Network Security, 11(2), 106–113.

    MathSciNet  Google Scholar 

  19. Moldovyan, N. (2011). Blind signature schemes from digital signature standards. International Journal of Network Security, 12(3), 202–210.

    Google Scholar 

  20. Nedal, T., Ashraf, T., Ramzi, A., & Talal, E. (2020). Design of identity-based blind signature scheme upon chaotic maps. International Journal of Online and Biomedical Engineering, 16(5), 104–118.

    Article  Google Scholar 

  21. Popescu, C. (2010). Blind signature schemes based on the elliptic curve discrete logarithm problem. Studies in Informatics and Control, 19(4), 397–402.

    Article  Google Scholar 

  22. Pointcheval, D., & Stern, J. (2010). Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13, 361–396.

    Article  Google Scholar 

  23. Shamir, A. (1984). Identity-based cryptosystem and signature scheme. Advances in Cryptology-Crypto, LNCS, 196, 47–53.

    MathSciNet  Google Scholar 

  24. Stadler, M., Piveteau, J. M., & Camenisch, J. (1995). Fair blind signatures. Advances in Cryptology-Eurocrypt, LNCS, 921, 209–219.

    Article  Google Scholar 

  25. Solms, S., & Naccache, D. (1992). On blind signatures and perfect crimes. Computer and Security, 11(6), 581–583.

    Article  Google Scholar 

  26. Singh, S., & Padhye, S. (2020). Identity based blind signature scheme over NTRU lattices. Information Processing Letters, 155, 105898.

    Article  MathSciNet  Google Scholar 

  27. Tripathy, A., Parta, I., & Jena, D. (2010). Proxy blind signature based on ECDLP. International Journal of Computer and Network Security, 2(6), 93–98.

    Google Scholar 

  28. Tang, Q., & Shen, F. (2013). Identity-based Xtr blind signature scheme. Intelligent Automation and Soft Computing, 19(2), 143–149.

    Article  Google Scholar 

  29. Tan, Z. (2013). Efficient pairing-free provably secure identity-based proxy blind signature scheme. Security and Communication Networks, 6, 593–601.

    Article  Google Scholar 

  30. Yang, X., Liang, Z., Wei, P., & Shen, J. (2009). A provably secure certificateless blind signature scheme. Fifth International Conference on Information Assurance and Security, 2, 643–646.

    Article  Google Scholar 

  31. Zhang, F., & Kim, K. (2002). ID-based blind signature and ring signature from pairings. Advances in Cryptology-ASIACRYPT, LNCS, 2501, 533–547.

    MathSciNet  MATH  Google Scholar 

  32. Zhang, L., & Ma, Y. (2014). A lattice-based identity-based proxy blind signature scheme in the standard model. Mathematical Problems in Engineering, (pp. 6, vol. 2014), Article ID 307637.

  33. Zhu, H., Tan, Y., Zhu, L., Zhang, Q., & Li, Y. (2018). An efficient identity-based proxy blind signature for semioffline services. Wireless Communications and Mobile Computing, (p. 9), article ID 5401890.

  34. Zhu, H., Tan, Y., Zhu, L., Wang, X., Zhang, Q., & Li, Y. (2018). An identity-based anti-quantum privacy-preserving blind authentication in wireless sensor networks. Sensors, 18(5), 1663.

    Article  Google Scholar 

Download references

Acknowledgements

This research is supported by the National Natural Science Foundation of China under Grant No. 61962011, the Innovation Group Major Research Projects of Department of Education of Guizhou Province under Grant No. KY[2016]026, the Science and Technology Plan Project of Guizhou Province under Grant No. [2019]1434.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lunzhi Deng.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Deng, L., He, X. & Xia, T. Secure Identity-Based Blind Signature Scheme for Online Transactions. Wireless Pers Commun 116, 1525–1537 (2021). https://doi.org/10.1007/s11277-020-07747-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-020-07747-8

Keywords