Skip to main content

2020 | OriginalPaper | Buchkapitel

A Pairing-Less Identity-Based Blind Signature with Message Recovery Scheme for Cloud-Assisted Services

verfasst von : Mahender Kumar, Satish Chand

Erschienen in: Information Security and Cryptology

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The rapid growing big data enforces many organizations to shift their data and services like digital right management, e-payment, and e-voting systems to the cloud. In such cloud-assisted services, the blind signature scheme could be one of the cryptographic tools, which provides the integrity of data and user anonymity. It allows the user to ask the signer for signing on message without disclosing any information about the content to the signer. Since several blind signature schemes have been proposed, but due to the expensive computation and bandwidth cost, they are impractical for the cloud-assisted as well as Internet-based environment. In this paper, we propose a new provable secure identity-based blind signature scheme with message recovery (IDBS-MR) using the elliptic curve cryptography. The proposed IDBS-MR scheme does not transmit the message with the signature while the message is recovered during verification round; hence it has the least message-signature length. The security analysis shows that the proposed IDBS-MR scheme is secured against existential forgery attack under the adaptive chosen message and ID attacks (EF-ID-CMA) under the assumption of solving the ECDL problem, and random oracle model (ROM) and achieves blindness property. The performance analysis shows that our scheme is efficient as compared to related existing schemes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Zhu, H., Tan, Y., Zhang, X., Zhu, L., Zhang, C., Zheng, J.: A round-optimal lattice-based blind signature scheme for cloud services. Future Gener. Comput. Syst. 73, 106–114 (2017)CrossRef Zhu, H., Tan, Y., Zhang, X., Zhu, L., Zhang, C., Zheng, J.: A round-optimal lattice-based blind signature scheme for cloud services. Future Gener. Comput. Syst. 73, 106–114 (2017)CrossRef
3.
Zurück zum Zitat Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–90 (1981)CrossRef Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–90 (1981)CrossRef
4.
5.
Zurück zum Zitat Horster, P., Michels, M., Petersen, H.: Comment: cryptanalysis of the blind signatures based on the discrete logarithm problem. Electron. Lett. 31, 1827 (1995)CrossRef Horster, P., Michels, M., Petersen, H.: Comment: cryptanalysis of the blind signatures based on the discrete logarithm problem. Electron. Lett. 31, 1827 (1995)CrossRef
6.
Zurück zum Zitat Lee, B., Boyd, C., Dawson, E., Kim, K., Yang, J., Yoo, S.: Secure key issuing in ID-based cryptography. In: Proceedings of the Second Workshop on Australasian Information Security, Data Mining and Web Intelligence, and Software Internationalisation, vol. 32, pp. 69–74 (2004) Lee, B., Boyd, C., Dawson, E., Kim, K., Yang, J., Yoo, S.: Secure key issuing in ID-based cryptography. In: Proceedings of the Second Workshop on Australasian Information Security, Data Mining and Web Intelligence, and Software Internationalisation, vol. 32, pp. 69–74 (2004)
7.
Zurück zum Zitat Shamir, A.: Identity-based cryptosystems and signature schemes. In: Workshop on the Theory and Application of Cryptographic Techniques, pp. 47–53 (1984) Shamir, A.: Identity-based cryptosystems and signature schemes. In: Workshop on the Theory and Application of Cryptographic Techniques, pp. 47–53 (1984)
12.
Zurück zum Zitat Elkamchouchi, H.M., Abouelseoud, Y.: A new blind identity-based signature scheme with message recovery. IACR Cryptol. ePrint Arch. 2008, 38 (2008) Elkamchouchi, H.M., Abouelseoud, Y.: A new blind identity-based signature scheme with message recovery. IACR Cryptol. ePrint Arch. 2008, 38 (2008)
14.
Zurück zum Zitat Gao, W., Wang, G., Wang, X., Li, F.: Round-optimal ID-based blind signature schemes without ROS assumption (2012) Gao, W., Wang, G., Wang, X., Li, F.: Round-optimal ID-based blind signature schemes without ROS assumption (2012)
15.
Zurück zum Zitat Kumar, M., Katti, C.P., Saxena, P.C.: A new blind signature scheme using identity-based technique. Int. J. Control Theory Appl. 10(15), 36–42 (2017) Kumar, M., Katti, C.P., Saxena, P.C.: A new blind signature scheme using identity-based technique. Int. J. Control Theory Appl. 10(15), 36–42 (2017)
16.
Zurück zum Zitat He, D., Chen, J., Zhang, R.: An efficient identity-based blind signature scheme without bilinear pairings. Comput. Electr. Eng. 37(4), 444–450 (2011)CrossRef He, D., Chen, J., Zhang, R.: An efficient identity-based blind signature scheme without bilinear pairings. Comput. Electr. Eng. 37(4), 444–450 (2011)CrossRef
18.
Zurück zum Zitat Dong, G., Gao, F., Shi, W., Gong, P.: An efficient certificateless blind signature scheme without bilinear pairing. An. Acad. Bras. Cienc. 86(2), 1003–1011 (2014)CrossRef Dong, G., Gao, F., Shi, W., Gong, P.: An efficient certificateless blind signature scheme without bilinear pairing. An. Acad. Bras. Cienc. 86(2), 1003–1011 (2014)CrossRef
19.
Zurück zum Zitat Tian, X.-X., Li, H.-J., Xu, J.-P., Wang, Y.: A security enforcement ID-based partially blind signature scheme. In: 2009 International Conference on Web Information Systems and Mining, WISM 2009, pp. 488–492 (2009) Tian, X.-X., Li, H.-J., Xu, J.-P., Wang, Y.: A security enforcement ID-based partially blind signature scheme. In: 2009 International Conference on Web Information Systems and Mining, WISM 2009, pp. 488–492 (2009)
20.
Zurück zum Zitat Islam, S.K.H., Amin, R., Biswas, G.P., Obaidat, M.S., Khan, M.K.: Provably secure pairing-free identity-based partially blind signature scheme and its application in online E-cash system. Arab. J. Sci. Eng. 41, 1–14 (2016)MathSciNetCrossRef Islam, S.K.H., Amin, R., Biswas, G.P., Obaidat, M.S., Khan, M.K.: Provably secure pairing-free identity-based partially blind signature scheme and its application in online E-cash system. Arab. J. Sci. Eng. 41, 1–14 (2016)MathSciNetCrossRef
21.
Zurück zum Zitat Verma, G.K., Singh, B.B.: Efficient identity-based blind message recovery signature scheme from pairings. IET Inf. Secur. 12(2), 150–156 (2017)CrossRef Verma, G.K., Singh, B.B.: Efficient identity-based blind message recovery signature scheme from pairings. IET Inf. Secur. 12(2), 150–156 (2017)CrossRef
23.
Zurück zum Zitat Hu, X.-M., Huang, S.-T.: Secure identity-based blind signature scheme in the standard model. J. Inf. Sci. Eng. 26(1), 215–230 (2010)MathSciNetMATH Hu, X.-M., Huang, S.-T.: Secure identity-based blind signature scheme in the standard model. J. Inf. Sci. Eng. 26(1), 215–230 (2010)MathSciNetMATH
25.
Zurück zum Zitat Han, S., Chang, E.: A pairing-based blind signature scheme with message recovery. Int. J. Inf. Technol. 2(4), 187–192 (2005) Han, S., Chang, E.: A pairing-based blind signature scheme with message recovery. Int. J. Inf. Technol. 2(4), 187–192 (2005)
26.
Zurück zum Zitat Zhang, L., Hu, Y., Tian, X., Yang, Y.: Novel identity-based blind signature for electronic voting system. In: 2010 Second International Workshop on Education Technology and Computer Science (ETCS), vol. 2, pp. 122–125 (2010) Zhang, L., Hu, Y., Tian, X., Yang, Y.: Novel identity-based blind signature for electronic voting system. In: 2010 Second International Workshop on Education Technology and Computer Science (ETCS), vol. 2, pp. 122–125 (2010)
28.
Zurück zum Zitat Kumar, M., Katti, C.P.: An efficient ID-based partially blind signature scheme and application in electronic-cash payment system. ACCENTS Trans. Inf. Secur. 2(6), 36–42 (2016)CrossRef Kumar, M., Katti, C.P.: An efficient ID-based partially blind signature scheme and application in electronic-cash payment system. ACCENTS Trans. Inf. Secur. 2(6), 36–42 (2016)CrossRef
30.
Zurück zum Zitat Islam, S.K., Obaidat, M.S.: Design of provably secure and efficient certificateless blind signature scheme using bilinear pairing. Secur. Commun. Netw. 8(18), 4319–4332 (2015) CrossRef Islam, S.K., Obaidat, M.S.: Design of provably secure and efficient certificateless blind signature scheme using bilinear pairing. Secur. Commun. Netw. 8(18), 4319–4332 (2015) CrossRef
31.
Zurück zum Zitat James, S., Gowri, T., Babu, G.V., Reddy, P.V.: Identity-based blind signature scheme with message recovery. Int. J. Electr. Comput. Eng. 7(5), 2088–8708 (2017) James, S., Gowri, T., Babu, G.V., Reddy, P.V.: Identity-based blind signature scheme with message recovery. Int. J. Electr. Comput. Eng. 7(5), 2088–8708 (2017)
32.
Zurück zum Zitat James, S., Gayathri, N.B., Reddy, P.: Pairing free identity-based blind signature scheme with message recovery. Cryptography 2(4), 29 (2018)CrossRef James, S., Gayathri, N.B., Reddy, P.: Pairing free identity-based blind signature scheme with message recovery. Cryptography 2(4), 29 (2018)CrossRef
33.
Zurück zum Zitat Diao, L., Gu, J., Yen, I.-L.: A new proxy blind signature scheme with message recovery. Inf. Technol. J. 12(21), 6159 (2013)CrossRef Diao, L., Gu, J., Yen, I.-L.: A new proxy blind signature scheme with message recovery. Inf. Technol. J. 12(21), 6159 (2013)CrossRef
34.
Zurück zum Zitat Tso, R., Gu, C., Okamoto, T., Okamoto, E.: An efficient ID-based digital signature with message recovery based on pairing. IACR Cryptol. ePrint Arch. 2006, 195 (2006)MATH Tso, R., Gu, C., Okamoto, T., Okamoto, E.: An efficient ID-based digital signature with message recovery based on pairing. IACR Cryptol. ePrint Arch. 2006, 195 (2006)MATH
35.
Zurück zum Zitat Cao, X., Kou, W., Du, X.: A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges. Inf. Sci. (Ny) 180(15), 2895–2903 (2010)MathSciNetCrossRef Cao, X., Kou, W., Du, X.: A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges. Inf. Sci. (Ny) 180(15), 2895–2903 (2010)MathSciNetCrossRef
36.
Zurück zum Zitat Debiao, H., Jianhua, C., Jin, H.: An ID-based proxy signature schemes without bilinear pairings. Ann. Telecommun. Télécommun. 66(11–12), 657–662 (2011)CrossRef Debiao, H., Jianhua, C., Jin, H.: An ID-based proxy signature schemes without bilinear pairings. Ann. Telecommun. Télécommun. 66(11–12), 657–662 (2011)CrossRef
37.
Zurück zum Zitat Islam, S.K.H., Biswas, G.P.: A pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks. Ann. Télécommun.-Ann. Telecommun. 67(11–12), 547–558 (2012)CrossRef Islam, S.K.H., Biswas, G.P.: A pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks. Ann. Télécommun.-Ann. Telecommun. 67(11–12), 547–558 (2012)CrossRef
39.
Zurück zum Zitat Kumar, M., Chand, S.: ESKI-IBE: efficient and secure key issuing identity-based encryption with cloud privacy centers. Multimed. Tool Appl. 78, 19753–19786 (2019)CrossRef Kumar, M., Chand, S.: ESKI-IBE: efficient and secure key issuing identity-based encryption with cloud privacy centers. Multimed. Tool Appl. 78, 19753–19786 (2019)CrossRef
40.
Zurück zum Zitat Lynn, B.: The pairing-based cryptography (PBC) library (2010) Lynn, B.: The pairing-based cryptography (PBC) library (2010)
41.
Zurück zum Zitat Shim, K.-A., Lee, Y.-R., Park, C.-M.: EIBAS: an efficient identity-based broadcast authentication scheme in wireless sensor networks. Ad Hoc Netw. 11(1), 182–189 (2013)CrossRef Shim, K.-A., Lee, Y.-R., Park, C.-M.: EIBAS: an efficient identity-based broadcast authentication scheme in wireless sensor networks. Ad Hoc Netw. 11(1), 182–189 (2013)CrossRef
42.
Zurück zum Zitat Chung, Y.F., Huang, K.H., Lai, F., Chen, T.S.: ID-based digital signature scheme on the elliptic curve cryptosystem. Comput. Stand. Interfaces 29(6), 601–604 (2007)CrossRef Chung, Y.F., Huang, K.H., Lai, F., Chen, T.S.: ID-based digital signature scheme on the elliptic curve cryptosystem. Comput. Stand. Interfaces 29(6), 601–604 (2007)CrossRef
Metadaten
Titel
A Pairing-Less Identity-Based Blind Signature with Message Recovery Scheme for Cloud-Assisted Services
verfasst von
Mahender Kumar
Satish Chand
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-42921-8_24