An ID-Based Partially Blind Signature Scheme With Adaptive Delegation For Networked Embedded Systems

نویسندگان

  • Baokang Zhao
  • Jinshu Su
  • Wei Peng
  • YingZhi Zeng
  • Meng Wang
چکیده

With the rapid evolution of intelligent computing and networking technology, security support is a must for the emerging networked embedded systems. As a key building block of the security infrastructure for the networked embedded systems, the design of signature schemes is one of the most critical aspects in the research field of secure networked embedded systems. In this paper, we propose a novel identity-based partially blind signature scheme with adaptive delegation, which is cost-efficient and very suitable under several constraints of networked embedded systems. We analyze the security, efficiency of our scheme, and conduct experiments on a typical networked embedded platform. The experimental results show that our technique can perform better compared with the previous work.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings

Blind signature and proxy signature are very important technologies in secure e-commerce. Identity-based (simply ID-based) public key cryptosystem can be a good alternative for certificate-based public key setting, especially when efficient key management and moderate security are required. In this paper, we propose a new ID-based blind signature scheme and an ID-based partial delegation proxy ...

متن کامل

ID-based restrictive partially blind signatures and applications

Restrictive blind signatures allow a recipient to receive a blind signature on a message not known to the signer but the choice of message is restricted and must conform to certain rules. Partially blind signatures allow a signer to explicitly include necessary information (expiration date, collateral conditions, or whatever) in the resulting signatures under some agreement with receiver. Restr...

متن کامل

ID-Based Restrictive Partially Blind Signatures

Restrictive blind signatures allow a recipient to receive a blind signature on a message not know to the signer but the choice of message is restricted and must conform to certain rules. Partially blind signatures allow a signer to explicitly include necessary information (expiration date, collateral conditions, or whatever) in the resulting signatures under some agreement with receiver. Restri...

متن کامل

An efficient blind signature scheme based on the elliptic curve discrete logarithm problem

Elliptic Curve Cryptosystems (ECC) have recently received significant attention by researchers due to their high performance such as low computational cost and small key size. In this paper a novel untraceable blind signature scheme is presented. Since the security of proposed method is based on difficulty of solving discrete logarithm over an elliptic curve, performance of the proposed scheme ...

متن کامل

On the Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature

Restrictive partially blind signature (RPBS) plays an important role in designing secure electronic cash system. Very recently, Wang, Tang and Li proposed a new ID-based restrictive partially blind signature (ID-RPBS) and gave the security proof. In this paper, we present a cryptanalysis of the scheme and show that the signature scheme does not satisfy the property of unforgeability as claimed....

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Intelligent Automation & Soft Computing

دوره 15  شماره 

صفحات  -

تاریخ انتشار 2009