Skip to main content
Top
Published in: Wireless Personal Communications 3/2021

24-08-2020

Secure Identity-Based Blind Signature Scheme for Online Transactions

Authors: Lunzhi Deng, Xiuru He, Tian Xia

Published in: Wireless Personal Communications | Issue 3/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Today, more and more business activities are done through online transactions. How to protect the personal privacy of customers in online transactions has become an urgent issue. Blind signature (BS) is suitable for online transactions because it can hide the specific content of the signed message. The security proofs of most BS schemes are given in the random oracle model (ROM). As we all know, the cryptographic scheme that is proven to be secure in ROM may be insecure in practical applications. In this paper, we fist study the security requirements for identity-based BS (IBBS) scheme, then design a concrete IBBS scheme and show the security proofs in the standard model. Finally, we compare the proposed scheme with the other two BS schemes. Requiring only three pairing operations, the proposed scheme is much efficient and is suitable for online transactions.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Chaum, D. (1983). Blind signatures for untraceable payments. Advances in Cryptology LNCS, 1440, 199–203.CrossRef Chaum, D. (1983). Blind signatures for untraceable payments. Advances in Cryptology LNCS, 1440, 199–203.CrossRef
2.
go back to reference Chen, X., Zhang, F., & Liu, S. (2007). ID-based restrictive partially blind signatures and applications. Journal of Systems and Software, 80, 164–171.CrossRef Chen, X., Zhang, F., & Liu, S. (2007). ID-based restrictive partially blind signatures and applications. Journal of Systems and Software, 80, 164–171.CrossRef
3.
go back to reference Chow, S. (2009). Blind signature and ring signature schemes: rehabilitation and attack. Computer Standards and Interfaces, 31, 707–712.CrossRef Chow, S. (2009). Blind signature and ring signature schemes: rehabilitation and attack. Computer Standards and Interfaces, 31, 707–712.CrossRef
4.
go back to reference Cui, W., & Jia, Q. (2019) Provably secure pairing-free identity-based restrictive partially blind signature scheme. IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference, (pp. 1038–1042). Cui, W., & Jia, Q. (2019) Provably secure pairing-free identity-based restrictive partially blind signature scheme. IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference, (pp. 1038–1042).
5.
go back to reference Dong, G., Gao, F., Shi, W., & Gong, P. (2014). An efficient certificateless blind signature scheme without bilinear pairing. Annals of the Brazilian Academy of Sciences, 86(2), 1003–1011.CrossRef Dong, G., Gao, F., Shi, W., & Gong, P. (2014). An efficient certificateless blind signature scheme without bilinear pairing. Annals of the Brazilian Academy of Sciences, 86(2), 1003–1011.CrossRef
6.
go back to reference Girraj, K., & Singh, B. (2018). Efficient identity-based blind message recovery signature scheme from pairings. IET Infomation Security, 12(2), 150–156.CrossRef Girraj, K., & Singh, B. (2018). Efficient identity-based blind message recovery signature scheme from pairings. IET Infomation Security, 12(2), 150–156.CrossRef
7.
go back to reference Huang, Z., Chen, K., & Wang, Y. (2005). Efficient identity based signatures and blind signatures. International Conference on Cryptology and Network Security, LNCS, (pp. 120–133, vol. 3810). Huang, Z., Chen, K., & Wang, Y. (2005). Efficient identity based signatures and blind signatures. International Conference on Cryptology and Network Security, LNCS, (pp. 120–133, vol. 3810).
8.
go back to reference Hu, X., & Huang, S. (2010). Secure identity-based blind signature scheme in the standard model. Journal of Information Science and Engineering, 26, 215–230.MathSciNetMATH Hu, X., & Huang, S. (2010). Secure identity-based blind signature scheme in the standard model. Journal of Information Science and Engineering, 26, 215–230.MathSciNetMATH
9.
go back to reference He, D., Chen, J., & Zhang, R. (2011). An efficient identity-based blind signature scheme without bilinear pairings. Computers and Electrical Engineering, 37, 444–450.CrossRef He, D., Chen, J., & Zhang, R. (2011). An efficient identity-based blind signature scheme without bilinear pairings. Computers and Electrical Engineering, 37, 444–450.CrossRef
10.
go back to reference He, D., Zeadally, S., Kumar, N., & Wu, W. (2016). Efficient and anonymous mobile user authentication protocol using self-certified public key cryptography for multi-server architectures. IEEE Transactions on Information Forensics and Security, 11(9), 2052–2064.CrossRef He, D., Zeadally, S., Kumar, N., & Wu, W. (2016). Efficient and anonymous mobile user authentication protocol using self-certified public key cryptography for multi-server architectures. IEEE Transactions on Information Forensics and Security, 11(9), 2052–2064.CrossRef
11.
go back to reference SK Hafizul, I., & Mohammad S, O. (2015). Design of provably secure and efficient certificateless blind signature scheme using bilinear pairing. Security and Communication Networks, 8, 4319–4332. SK Hafizul, I., & Mohammad S, O. (2015). Design of provably secure and efficient certificateless blind signature scheme using bilinear pairing. Security and Communication Networks, 8, 4319–4332.
12.
go back to reference Sk Hafizul, I., Ruhul, A., GP, B., Mohammad S, O., & Muhammad, K. (2016). Provably secure pairing-free identity-based partially blind signature scheme and its application in online e-cash system. Arabian Journal for Science and Engineering, 41(8), 3163–3176.MathSciNetCrossRef Sk Hafizul, I., Ruhul, A., GP, B., Mohammad S, O., & Muhammad, K. (2016). Provably secure pairing-free identity-based partially blind signature scheme and its application in online e-cash system. Arabian Journal for Science and Engineering, 41(8), 3163–3176.MathSciNetCrossRef
14.
go back to reference Li, F., Zhang, M., & Takagi, T. (2013). Identity-based partially blind signature in the standard model for electronic cash. Mathematical and Computer Modelling, 58, 196–203.MathSciNetCrossRef Li, F., Zhang, M., & Takagi, T. (2013). Identity-based partially blind signature in the standard model for electronic cash. Mathematical and Computer Modelling, 58, 196–203.MathSciNetCrossRef
15.
go back to reference Li, Q., Hsu, C., He, D., Choo, K., & Gong, P. (2020). An identity-based blind signature scheme using lattice with provable security. Mathematical Problems in Engineering, vol. 2020, Article ID 7528571:1-12. Li, Q., Hsu, C., He, D., Choo, K., & Gong, P. (2020). An identity-based blind signature scheme using lattice with provable security. Mathematical Problems in Engineering, vol. 2020, Article ID 7528571:1-12.
16.
go back to reference LeTrieu, P., & Wakaha, O. (2009). New identity-based blind signature and blind decryption scheme in the standard model. IEICE Transactions on Fundamentals of Electronics Communications and computer Sciences, LNCS, (pp. 1822–1835, vol. E92A, no. 8). LeTrieu, P., & Wakaha, O. (2009). New identity-based blind signature and blind decryption scheme in the standard model. IEICE Transactions on Fundamentals of Electronics Communications and computer Sciences, LNCS, (pp. 1822–1835, vol. E92A, no. 8).
17.
go back to reference Lourdes, L., Luis, J., & Francisco, R. (2014). A pairing-based blind signature e-voting scheme. Computer Journal, 57(10), 1460–1471.CrossRef Lourdes, L., Luis, J., & Francisco, R. (2014). A pairing-based blind signature e-voting scheme. Computer Journal, 57(10), 1460–1471.CrossRef
18.
go back to reference Moldovyan, N. (2010). Blind collective signature scheme based on discrete logarithm problem. International Journal of Network Security, 11(2), 106–113.MathSciNet Moldovyan, N. (2010). Blind collective signature scheme based on discrete logarithm problem. International Journal of Network Security, 11(2), 106–113.MathSciNet
19.
go back to reference Moldovyan, N. (2011). Blind signature schemes from digital signature standards. International Journal of Network Security, 12(3), 202–210. Moldovyan, N. (2011). Blind signature schemes from digital signature standards. International Journal of Network Security, 12(3), 202–210.
20.
go back to reference Nedal, T., Ashraf, T., Ramzi, A., & Talal, E. (2020). Design of identity-based blind signature scheme upon chaotic maps. International Journal of Online and Biomedical Engineering, 16(5), 104–118.CrossRef Nedal, T., Ashraf, T., Ramzi, A., & Talal, E. (2020). Design of identity-based blind signature scheme upon chaotic maps. International Journal of Online and Biomedical Engineering, 16(5), 104–118.CrossRef
21.
go back to reference Popescu, C. (2010). Blind signature schemes based on the elliptic curve discrete logarithm problem. Studies in Informatics and Control, 19(4), 397–402.CrossRef Popescu, C. (2010). Blind signature schemes based on the elliptic curve discrete logarithm problem. Studies in Informatics and Control, 19(4), 397–402.CrossRef
22.
go back to reference Pointcheval, D., & Stern, J. (2010). Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13, 361–396.CrossRef Pointcheval, D., & Stern, J. (2010). Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13, 361–396.CrossRef
23.
go back to reference Shamir, A. (1984). Identity-based cryptosystem and signature scheme. Advances in Cryptology-Crypto, LNCS, 196, 47–53.MathSciNet Shamir, A. (1984). Identity-based cryptosystem and signature scheme. Advances in Cryptology-Crypto, LNCS, 196, 47–53.MathSciNet
24.
go back to reference Stadler, M., Piveteau, J. M., & Camenisch, J. (1995). Fair blind signatures. Advances in Cryptology-Eurocrypt, LNCS, 921, 209–219.CrossRef Stadler, M., Piveteau, J. M., & Camenisch, J. (1995). Fair blind signatures. Advances in Cryptology-Eurocrypt, LNCS, 921, 209–219.CrossRef
25.
go back to reference Solms, S., & Naccache, D. (1992). On blind signatures and perfect crimes. Computer and Security, 11(6), 581–583.CrossRef Solms, S., & Naccache, D. (1992). On blind signatures and perfect crimes. Computer and Security, 11(6), 581–583.CrossRef
26.
go back to reference Singh, S., & Padhye, S. (2020). Identity based blind signature scheme over NTRU lattices. Information Processing Letters, 155, 105898.MathSciNetCrossRef Singh, S., & Padhye, S. (2020). Identity based blind signature scheme over NTRU lattices. Information Processing Letters, 155, 105898.MathSciNetCrossRef
27.
go back to reference Tripathy, A., Parta, I., & Jena, D. (2010). Proxy blind signature based on ECDLP. International Journal of Computer and Network Security, 2(6), 93–98. Tripathy, A., Parta, I., & Jena, D. (2010). Proxy blind signature based on ECDLP. International Journal of Computer and Network Security, 2(6), 93–98.
28.
go back to reference Tang, Q., & Shen, F. (2013). Identity-based Xtr blind signature scheme. Intelligent Automation and Soft Computing, 19(2), 143–149.CrossRef Tang, Q., & Shen, F. (2013). Identity-based Xtr blind signature scheme. Intelligent Automation and Soft Computing, 19(2), 143–149.CrossRef
29.
go back to reference Tan, Z. (2013). Efficient pairing-free provably secure identity-based proxy blind signature scheme. Security and Communication Networks, 6, 593–601.CrossRef Tan, Z. (2013). Efficient pairing-free provably secure identity-based proxy blind signature scheme. Security and Communication Networks, 6, 593–601.CrossRef
30.
go back to reference Yang, X., Liang, Z., Wei, P., & Shen, J. (2009). A provably secure certificateless blind signature scheme. Fifth International Conference on Information Assurance and Security, 2, 643–646.CrossRef Yang, X., Liang, Z., Wei, P., & Shen, J. (2009). A provably secure certificateless blind signature scheme. Fifth International Conference on Information Assurance and Security, 2, 643–646.CrossRef
31.
go back to reference Zhang, F., & Kim, K. (2002). ID-based blind signature and ring signature from pairings. Advances in Cryptology-ASIACRYPT, LNCS, 2501, 533–547.MathSciNetMATH Zhang, F., & Kim, K. (2002). ID-based blind signature and ring signature from pairings. Advances in Cryptology-ASIACRYPT, LNCS, 2501, 533–547.MathSciNetMATH
32.
go back to reference Zhang, L., & Ma, Y. (2014). A lattice-based identity-based proxy blind signature scheme in the standard model. Mathematical Problems in Engineering, (pp. 6, vol. 2014), Article ID 307637. Zhang, L., & Ma, Y. (2014). A lattice-based identity-based proxy blind signature scheme in the standard model. Mathematical Problems in Engineering, (pp. 6, vol. 2014), Article ID 307637.
33.
go back to reference Zhu, H., Tan, Y., Zhu, L., Zhang, Q., & Li, Y. (2018). An efficient identity-based proxy blind signature for semioffline services. Wireless Communications and Mobile Computing, (p. 9), article ID 5401890. Zhu, H., Tan, Y., Zhu, L., Zhang, Q., & Li, Y. (2018). An efficient identity-based proxy blind signature for semioffline services. Wireless Communications and Mobile Computing, (p. 9), article ID 5401890.
34.
go back to reference Zhu, H., Tan, Y., Zhu, L., Wang, X., Zhang, Q., & Li, Y. (2018). An identity-based anti-quantum privacy-preserving blind authentication in wireless sensor networks. Sensors, 18(5), 1663.CrossRef Zhu, H., Tan, Y., Zhu, L., Wang, X., Zhang, Q., & Li, Y. (2018). An identity-based anti-quantum privacy-preserving blind authentication in wireless sensor networks. Sensors, 18(5), 1663.CrossRef
Metadata
Title
Secure Identity-Based Blind Signature Scheme for Online Transactions
Authors
Lunzhi Deng
Xiuru He
Tian Xia
Publication date
24-08-2020
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 3/2021
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-020-07747-8

Other articles of this Issue 3/2021

Wireless Personal Communications 3/2021 Go to the issue