Authors: Kai Fan; Yue Wang; Hui Li
Addresses: State Key Laboratory of Integrated Service Networks, Xidian University, Xi'an, China. ' Xi'an Branch, Shaanxi Telecom Ltd., Xi'an, China. ' Ministry of Education Key Laboratory of Computer Network and Information Security, Xidian University, Xi'an, China
Abstract: There is no forward security in any proxy blind signature schemes today. The lack of forward security will impact the system security tremendously if the key is stolen. To avoid such a security problem this paper proposes a forward secure proxy blind signature scheme which employs the key evolution mechanism in a newly proposed proxy blind signature scheme. The security of proxy blind signature and the forward security are both analysed in the proposed scheme. Even if the current signature key is compromised, the attacker cannot forge signatures as if they had been generated before the key leakage. That is to say, signatures signed before the leakage are still valid.
Keywords: digital signatures; proxy blind signatures; forward security; key evolution; key leakage; signature keys; forged signatures.
International Journal of Grid and Utility Computing, 2012 Vol.3 No.1, pp.38 - 42
Received: 02 Nov 2011
Accepted: 02 Nov 2011
Published online: 20 Dec 2014 *