Journal of Electronics (China)

, Volume 25, Issue 2, pp 226–231 | Cite as

A new efficient ID-based proxy blind signature scheme

  • Ming Yang
  • Yumin Wang


In a proxy blind signature scheme, the proxy signer is allowed to generate a blind signature on behalf of the original signer. The proxy blind signature scheme is useful in several applications such as e-voting, e-payment, etc. Recently, Zheng, et al. presented an IDentity (ID)-based proxy blind signature. In this paper, a new efficient ID-based proxy blind signature scheme from bilinear pairings is proposed, which can satisfy the security properties of both the proxy signatures and the blind signature schemes. Analysis of the scheme efficiency shows that the new scheme is more efficient than Zheng, et al.’s scheme. The proposed scheme is more practical in the real world.

Key words

Blind signature Proxy signature Bilinear pairing 

CLC indexs



Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    D. Chaum. Blind signatures for untraceable payments. Advances in Cryptology-Crypto’82, Santa Barbara, California, USA, August 1983, 199–203.Google Scholar
  2. [2]
    M. Mambo, K. Usuda, and E. Okamoto. Proxy signatures: Delegation of the power to sign messages. IEICE Trans. on Fundamentals, E79-A(1996)9, 1338–1353.Google Scholar
  3. [3]
    M. Mambo, K. Usuda, and E. Okamoto. Proxy signatures for delegating signing operation. Proceedings of the 3rd ACM Conference on Computer and Communications Security-CCS’96, New Delhi, India, March 14–16, 1996, 48–57.Google Scholar
  4. [4]
    S. Kim, S. Park, and D. Won. Proxy signatures, revisited. Proceedings of the first International Conference on Information and Communications Security-ICICS’97, LNCS 1334, Beijing, P. R. China, November 11–13, 1997, 223–232.Google Scholar
  5. [5]
    T. Okamoto, M. Tada, and E. Okamoto. Extended proxy signatures for smart cards. Proceedings of the 2nd International Information Security Workshop-ISW’99, LNCS 1729, Kuala Lumpur, Malaysia, November 6–7, 1999, 247–258.Google Scholar
  6. [6]
    S. D. Galbraith, K. Harrison, and D. Soldera. Implementing the Tate pairing. Proceedings of the 5th International Algorithmic Number Theory Symposium-ANTS-V’02, LNCS 2369, Sydney, Australia, July 7–12, 2002, 324–337.Google Scholar
  7. [7]
    A. Shamir. Identity-based cryptosystems and signature schemes. Advances in Cryptology-Crypto’84, LNCS 196, Santa Barbara, California, USA, August 19–22, 1984, 47–53.Google Scholar
  8. [8]
    Z. Tan, Z. Liu, and C. Tang. Digital proxy blind signature schemes based on DLP and ECDLP. MM Research Preprints, MMRC, AMSS, Academia Sinica, Beijing, December 21, 2002, 212–217.Google Scholar
  9. [9]
    A. K. Awasthi and S. Lal. Proxy blind signature scheme. JFCR Trans. on Cryptology, 2(2005)1, 5–11.Google Scholar
  10. [10]
    H. M. Sun, B. T. Hsieh, and S. M. Tseng. On the security of some proxy signature schemes. Journal of System and Software, 74(2005)3, 297–302.CrossRefGoogle Scholar
  11. [11]
    Shaobin Wang, Hong Fan, and Guohua Cui. Secure efficient proxy blind signature schemes based DLP. Proceedings of the 7th IEEE International Conference on E-Commerce Technology-CEC’05, Münich, Germany, July 19–22, 2005, 452–455.Google Scholar
  12. [12]
    Jiguo Li and Shuhong Wang. New efficient proxy blind signature scheme using verifiable self-certified public key. International Journal of Network Security, 4(2007)2, 193–200.Google Scholar
  13. [13]
    F. G. Zhang, S. N. Reihanch, and C. Y. Lin. New proxy new proxy signature, proxy blind signature and proxy ring signature schemes from bilinear pairings. Cryptology ePrint Archive, Report 2003/104.
  14. [14]
    Zheng Dong, Huang Zheng, Kefei Chen, et al. ID-based proxy blind signature. Proceedings of the 18th International Conference on Advanced Information Networking and Applications-AINA’04, Fukuoka, Japan, March 29–31, 2004, vol.2, 380–383.Google Scholar
  15. [15]
    F. G. Zhang and K. Kim. Efficient ID-based blind signature and proxy signature from pairings. Proceedings of the 8th Australasia Conference on Information Security and Private-ACISP’03, LNCS 2727, Wollongong, Australia, July 9–11, 2003, 312–323.Google Scholar

Copyright information

© Science Press 2008

Authors and Affiliations

  1. 1.State Key Lab of Integrated Service NetworkXidian UniversityXi’anChina

Personalised recommendations