Abstract
A fair blind signature scheme allows the trustee to revoke blindness so that it provides authenticity and anonymity to honest users while preventing malicious users from abusing the anonymity to conduct blackmail etc. Although plausible constructions that offer efficient tricks for anonymity revocation have been published, security, especially one-more unforgeability and revocability against adaptive and parallel attacks, has not been studied well. We point out a concrete vulnerability of some of the previous schemes and present an efficient fair blind signature scheme with a security proof against most general attacks. Our scheme offers tight revocation where each signature and issuing session can be linked by the trustee.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
M. Abe.A three-move blind signature scheme secure for pollynomially many signatures.In B. Pfitzmann,editor,Advances in Cryptology-EUROCRYPT’ 01,volume 2045 of Lecture Notes in Computer Science,pages 136–51.Springer-Verlag, 2001.
M. Abe and T. Okamoto.Provably secure partially blind signatures. In M. Bellare, editor,Advances in Cryptology-RYPTO 2000,volume 1880 of Lecture Notes in Computer Science, pages 271–86.Springer-Verlag, 2000.
G. Ateniese.Efficient verifiable encryption (and fair exchange)of digital signatures. In ACM CCS’ 99, pages 138–46.Association for Computing Machinery,1999.
F. Bao. An efficient verifiable encryption scheme for encryption of discrete logarithms. In CARDIS’ 98,1998.
M. Bellare and P. Rogaway. Random oracles are practical:a paradigm for designing efficient protocols.In First ACM Conference on Computer and Communication Security,pages 62–3. Association for Computing Machinery,1993.
E. Brickell, P. Gemmell, and D. Kravitz. Trustee-based tracking extensions to anonymous cash and the making of anonymous change.In Proceedings of Sixth Annual ACM-SIAM Symposium on Discrete Algorithms, pages 457–66.ACM, 1995.
J. Camenisch.Group Signature Schemes and Payment Systems Based on the Discrete Logarithm Problem.PhD thesis, ETH Zürich,1998.
J. Camenisc and I. Damgård.Verifiable encryption, group encryption, and their applications to separable group signatures and signature sharing schemes.In T. Okamoto,editor,Advances in Cryptology-Asiacrypt 2000,volume 1976 of Lecture Notes in Computer Science, pages 331–45.Springer-Verlag, 2000.
J. Camenisch, J.-M. Piveteau,and M. Stadler.Fair blind signatures.In L.C. Guillou and J.-J. Quisquater,editors,Advances in Cryptology-EUROCRYPT’ 95, volume 921 of Lecture Notes in Computer Science, pages 209–19.Springer-Verlag, 1995.
D.L. Chaum and T.P. Pedersen.Wallet databases with observers.In E.F. Brickell,editor,Advances in Cryptology — RYPTO’ 92,volume 740of LectureNotes in Computer Science, pages 89–105.Springer-Verlag,1993.
A. Fiat and A. Shamir.How to prove yourself: Practical solutions to identification and signature problems.In A.M. Odlyzko,editor,Advances in Cryptology —CRYPTO’ 86,volume 263 of Lecture Notes in Computer Science, pages 186–99. Springer-Verlag,1987.
Y. Frankel, Y. Tsiounis,and M. Yung. ”Indirect discourse proofs”: Achieving efficient fair off-line e-cash. In K. Kim and T. Matsumoto,editors,Advances in Cryptology-ASIACRYPT’ 96,volume 1163 of Lecture Notes in Computer Science,pages 286–300.Springer-Verlag, 1996.
E. Fujisaki.A simple approac to secretly sharing a factoring witness in publicly-verifiable manner.(unpublished manuscript),2001.
E. Fujisaki and T. Okamoto.Statistical zero knowledge protocols to prove modular polynomial relations.In B.S. Kaliski Jr.,editor,Advances in Cryptology — CRYPTO’ 97,volume 1294 of Lecture Notes in Computer Science,pages 16–30.Springer-Verlag,1997.
M. Jakobsson and J. Müller.Improved magic ink signatures using hints.In Financial Cryptography’ 99,1999.
M. Jakobsson and M. Yung.Distributed ”magic Ink” signatures.In W. Fumy, editor,Advances in Cryptology-EUROCRYPT’ 97,volume 1233 of Lecture Notes in Computer Science,pages 450–464.Springer-Verlag,1997.
A. Juels, M. Luby, and R. Ostrovsky.Security of blind digital signatures.In B.S. Kaliski Jr.,editor,Advances in Cryptology — RYPTO’ 97,volume 1294 of Lecture Notes in Computer Science,pages 150–164.Springer-Verlag,1997.
T. Okamoto and K. Ohta.Divertible zero knowledge interactive proofs and commutative random self-reducibility.In J.-J. Quisquater and J. Vandewalle,editors, Advances in Cryptology — EUROCRYPT’ 89,volume 434 of Lecture Notes in Computer Science,pages 134–149.Springer-Verlag, 1990.
T. Okamoto and S. Uchiyama. A new public-key cryptosystem as secure as factoring.In K. Nyberg,editor,Advances in Cryptology — EUROCRYPT’ 98,volume 1403 of Lecture Notes in Computer Science,pages 308–318.Springer-Verlag,1998.
D. Pointcheval and J. Stern. Provably secure blind signature schemes.In K. Kim and T. Matsumoto,editors,Advances in Cryptology — ASIACRYPT’ 96,volume 1163 of Lecture Notes in Computer Science,pages 252–265.Springer-Verlag,1996.
D. Pointcheval and J. Stern.Security proofs for signature schemes.In U. Maurer, editor,Advances in Cryptology — EUROCRYPT’ 96,volume 1070 of Lecture Notes in Computer Science,pages 387–398.Springer-Verlag, 1996.
D. Pointcheval and J. Stern.Security arguments for digital signatures and blind signatures.Journal of Cryptology, 2000.
M. Stadler.Cryptographic Protocols for Revocable Privacy.PhD thesis,Swiss Federal Institute of Technology Zürich,1996.
M. Stadler.Publicly verifiable secret sharing.In U. Maurer,editor, Advances in Cryptology — EUROCRYPT’ 96,volume 1070 of Lecture Notes in Computer Science, pages 190–199.Springer-Verlag, 1996.
S. von Solms and D. Naccache.On blind signatures and perfect crime.Computer & Security,11: 581–583,1992.
A. Young and M. Yung. Finding length-3 positive cunningham chains and their cryptographic significance.In ANTS’ 98, Lecture Notes in Computer Science. Springer-Verlag,1998.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Abe, M., Ohkub, M. (2001). Provably Secure air Blind Signatures with Tight Revocation. In: Boyd, C. (eds) Advances in Cryptology — ASIACRYPT 2001. ASIACRYPT 2001. Lecture Notes in Computer Science, vol 2248. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45682-1_34
Download citation
DOI: https://doi.org/10.1007/3-540-45682-1_34
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42987-6
Online ISBN: 978-3-540-45682-7
eBook Packages: Springer Book Archive