ID-Based Blind Signature and Ring Signature from Pairings
Recently the bilinear pairing such as Weil pairing or Tate pairing on elliptic curves and hyperelliptic curves have been found various applications in cryptography. Several identity-based (simply ID-based) cryptosystems using bilinear pairings of elliptic curves or hyperelliptic curves were presented. Blind signature and ring signature are very useful to provide the user’s anonymity and the signer’s privacy. They are playing an important role in building e-commerce. In this paper, we firstly propose an ID-based blind signature scheme and an ID-based ring signature scheme, both of which are based on the bilinear pairings. Also we analyze their security and efficiency.
KeywordsBlind signature Ring signature Bilinear pairings ID-based cryptography Provably security
- 1.M. Abe, M. Ohkubo, and K. Suzuki, 1-out-of-n signatures from a variety of keys, To appear in Advances in Cryptology-Asiacrypt 2002, 2002.Google Scholar
- 6.J.C. Cha and J.H. Cheon, An identity-based signature from gap Diffie-Hellman groups, Cryptology ePrint Archive, Report 2002/018, available at http://eprint.iacr.org/2002/018/.
- 7.D. Chaum, Blind signatures for untraceable payments, Advances in Cryptology-Crypto 82, Plenum, NY, pp. 199–203, 1983.Google Scholar
- 10.S. D. Galbraith, K. Harrison, and D. Soldera, Implementing the Tate pairing, ANTS 2002, LNCS 2369, pp. 324–337, Springer-Verlag, 2002.Google Scholar
- 11.F. Hess, Exponent group signature schemes and efficient identity based signatureschemes based on pairings, Cryptology ePrint Archive, Report 2002/012, available at http://eprint.iacr.org/2002/012/.
- 13.IEEE Std 2000-1363, Standard specifications for public key cryptography, 2000.Google Scholar
- 14.A. Joux, A one round protocol for tripartite Diffie-Hellman, ANTS IV, LNCS 1838, pp. 385–394, Springer-Verlag, 2000.Google Scholar
- 15.A. Joux, The Weil and Tate Pairings as Building Blocks for Public Key Cryptosystems, ANTS 2002, LNCS 2369, pp. 20–32, Springer-Verlag, 2002.Google Scholar
- 17.M.S. Kim and K. Kim, A new identification scheme based on the bilinear Diffie-Hellman problem, Proc. of ACISP(The 7th Australasian Conference on Information Security and Privacy) 2002, LNCS 2384, pp. 464–481, Springer-Verlag, 2002.Google Scholar
- 20.K.G. Paterson, ID-based signatures from pairings on elliptic curves, Cryptology ePrint Archive, Report 2002/004, available at http://eprint.iacr.org/2002/004/.
- 23.R. Sakai, K. Ohgishi, M. Kasahara, Cryptosystems based on pairing, SCIS 2000-C20, Okinawa, Japan. Jan. 2000.Google Scholar
- 24.C. P. Schnorr, Security of blind discrete log signatures against interactive attacks, ICICS 2001, LNCS 2229, pp. 1–12, Springer-Verlag, 2001.Google Scholar