Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
494402 | Journal of Systems and Software | 2006 | 4 Pages |
Abstract
The proxy blind signature scheme allows the designated proxy signer using the proxy secret key to generate a blind signature on behalf of the original signer. Tan et al. presented the DLP-based and ECDLP based blind signature schemes. Awasthi and Lal proposed a improved DLP-based scheme later. Recently, Sun et al. presented linkability attack on Tan et al.’s and Awasthi–Lal’s proxy blind signature schemes respectively. In this paper, we show that Sun et al.’s attack is failed and these schemes are still satisfy the unlinkability property.
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Lin-Chuan Wu, Yi-Shiung Yeh, Tsann-Shyong Liu,