Skip to main content

An Improved Certificateless Partial Blind Signature Scheme Based on Homomorphic Encryption

  • Conference paper
  • First Online:
Advances in Artificial Intelligence and Security (ICAIS 2022)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1588))

Included in the following conference series:

Abstract

A modified Paillier homomorphic cryptography-based partial blind signature scheme is proposed to address the problems of centralized key generation in traditional blind signature schemes and the fact that the current tamper-proof protection scheme for public messages only protects them after they have been attacked or does not protect public messages. In this scheme, the certificateless idea allows the distribution of keys to be decentralized to the KGC (Public Key Generation) and the user’s personal key to be protected, while the partial blind signature idea ensures that the signer’s signature is not misused and protects the signed message. The experimental results show that the use of the Paillier homomorphic encryption algorithm not only satisfies the feasible operational efficiency, but also demonstrates that the scheme can be resisted before the public message is tampered with, improving the security of the scheme in terms of security and feasibility.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chaum, D.: Blind signatures for untraceable payments. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Advances in Cryptology, pp. 199–203. Springer, Boston (1983). https://doi.org/10.1007/978-1-4757-0602-4_18

    Chapter  Google Scholar 

  2. Abe, M., Fujisaki, E.: How to date blind signatures. In: Kim, K., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, vol. 1163, pp. 244–251. Springer, Heidelberg (1996). https://doi.org/10.1007/BFb0034851

    Chapter  Google Scholar 

  3. Abe, M., Camerisch J.: Partially blind signatures. In: 1997 Symposium on Cryptography and Information Security (1997)

    Google Scholar 

  4. Zhang, X.P., Yu, J.Y., Liang, B.: Improved identity-based blind signature scheme. Comput. Eng. Des. 27(21), 4123–4124 (2016)

    Google Scholar 

  5. Liu, Z.S., Zhang, F., Chen, X.: ID-based restrictive partially blind signatures and applications. J. Syst. Softw. 80(2), 164–171 (2007)

    Article  Google Scholar 

  6. Mao, Y.F., Deng, L.Z.: An identity-based blind signature scheme and its security proof. Comput. Mod. 04, 105–108 (2017)

    Google Scholar 

  7. Möser, M., Soska, K., Heilman, E.: An empirical analysis of traceability in the Monero blockchain. In: Proceedings on Privacy Enhancing Technologies, no. 3, pp. 143–163 (2018)

    Google Scholar 

  8. Kumar, A., Fischer, C., Tople, S., Saxena, P.: A traceability analysis of Monero’s blockchain. In: Foley, S.N., Gollmann, D., Snekkenes, E. (eds.) ESORICS 2017. LNCS, vol. 10493, pp. 153–173. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-66399-9_9

    Chapter  Google Scholar 

  9. Liu, E.G., Wang, X., Zhou, H.J.: Analysis and improvement of a certificateless blind signature scheme. Comput. Appl. Softw. 34(02), 308–312 (2017)

    Google Scholar 

  10. Chen, H.B., Zhang, L.: New efficient certificateless blind signature scheme. In: 2016 IEEE Trustcom/BigDataSE/I SPA IEEE, pp. 349–353 (2016)

    Google Scholar 

  11. Ribarski, P., Antovski L.: Comparison of lD-based blind signatures from pairings for e-voting protocols. In: International Convention on Information and Communication Technology, Electronics and Microelectronics, pp. 1394–1399. IEEE (2014)

    Google Scholar 

  12. Cao, S.Z., Dai, W.J., Wang, C.F., Wang, X.Y., Sun, H., Zuo, W.: Analysis and improvement of an ID-based partially blind signature scheme. Comput. Eng. Sci. 40(12), 2193–2197 (2018)

    Google Scholar 

  13. Cui, W., Jia, Q.: Provably secure pairing-free identity-based restrictive partially blind sig-nature scheme. In: 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), pp. 1038–1042 (2019)

    Google Scholar 

  14. Zheng, T., Zhang, S.B., Chang, Y., Li, X.Y.: Quantum blind signature scheme based on bell state entanglement swapping. Comput. Appl. Softw. 37(03), 310–313 (2020)

    Google Scholar 

  15. Zhang, L., Ma, Y.: A lattice-based identity-based proxy blind signature scheme in the standard model. Math. Probl. Eng. 2014(1) (2014)

    Google Scholar 

  16. Rawal, S., Padhye, S.: Cryptanalysis of ID based proxy-blind signature scheme over lattice. In: ICT Express, vol. 6, no. 1, pp. 20–22 (2020)

    Google Scholar 

  17. Zhou, Y.H., Dong, S.S., Yang, Y.G.: A lattice-based identity-based proxy partially blind signature scheme in the standard model. Netinfo Secur. 21(3), 37–43 (2021)

    Google Scholar 

  18. Rong, W.J.: Certificateless partially blind signature scheme. J. Zhangzhou Normal Univ. (Nat. Sci. Ed.) 21(3), 44–47 (2008)

    Google Scholar 

  19. Jiang, Y.H., Deng, L.Z.: Analysis and improvement of a partially blind signature scheme. J. Guizhou Normal Univ. (Nat. Sci. Ed.) 38(02), 85–91 (2020)

    Google Scholar 

  20. Tian, J., Du, Y.M., Li, S., Liu Y.: A paillier homomorphic encryption based location privacy protection scheme for crowdsensing task distribution. Comput. Sci. Explor. 1–9 (2021)

    Google Scholar 

  21. Diao, Y.Q., Ye, A.Y., Zhang, J.M., Deng, H.N., Zhang, Q., Cheng, B.R.: A dual privacy protection method based on group signature and homomorphic encryption for alliance blockchain. J. Comput. Res. Dev. 59, 172 (2022)

    Google Scholar 

  22. Hwang, Y., Lee, I.: A lightweight certificate-based aggregate signature scheme providing key insulation. Comput. Mater. Continua 69(2), 1747–1764 (2021)

    Article  Google Scholar 

  23. Khonde, S.R., Ulagamuthalvi, V.: Blockchain: secured solution for signature transfer in distributed intrusion detection system. Comput. Syst. Sci. Eng. 40(1), 37–51 (2022)

    Article  Google Scholar 

  24. Xu, G., Cao, Y., Xu, S., Xiao, K., Liu, X., et al.: A novel post-quantum blind signature for log system in blockchain. Comput. Syst. Sci. Eng. 41(3), 945–958 (2022)

    Article  Google Scholar 

  25. Ren, H., Niu, S.: Separable reversible data hiding in homomorphic encrypted domain using POB number system. Multimedia Tools Appl. 81(2), 2161–2187 (2021). https://doi.org/10.1007/s11042-021-11341-w

    Article  Google Scholar 

  26. Dong, D.P., Wu, Y., Xiong, L.Z., Xia, Z.H.: A privacy preserving deep linear regression scheme based on homomorphic encryption. J. Big Data 1(3), 145–150 (2019)

    Article  Google Scholar 

Download references

Acknowledgement

This work is supported by the Key Research and Development Project of Sichuan Province (No. 2021YFSY0012, No. 2020YFG0307, No. 2021YFG0332), the Key Research and Development Project of Chengdu (No. 2019-YF05-02028-GX), the Innovation Team of Quantum Security Communication of Sichuan Province (No. 17TD0009), the Academic and Technical Leaders Training Funding Support Projects of Sichuan Province (No. 2016120080102643).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhi Qin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tan, P., Qin, Z., Wan, W., Zhang, S., Zhang, J., Xia, J. (2022). An Improved Certificateless Partial Blind Signature Scheme Based on Homomorphic Encryption. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Advances in Artificial Intelligence and Security. ICAIS 2022. Communications in Computer and Information Science, vol 1588. Springer, Cham. https://doi.org/10.1007/978-3-031-06764-8_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-06764-8_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-06763-1

  • Online ISBN: 978-3-031-06764-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics