2017
DOI: 10.1155/2017/8981606
|View full text |Cite
|
Sign up to set email alerts
|

An ECC-Based Blind Signcryption Scheme for Multiple Digital Documents

Abstract: The popularity of the Internet has comprehensively altered the traditional way of communication and interaction patterns, such as e-contract negotiations, e-payment services, or digital credential processes. In the field of e-form systems, a number of studies investigate the ability of the blind signature to fulfill the basic properties of blindness and untraceability. However, most literatures exploring the blind signature mechanisms only address research and technology pertaining to single blind signature is… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
15
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(15 citation statements)
references
References 31 publications
0
15
0
Order By: Relevance
“…The main contribution of our work not only significantly strengthens the principles of provable security which we give the results of security analysis in Section 4, as pointed out by [21] [27] and [28], including unforgeability, non-repudiation and unlinkability, but also innovatively offers a model for proxy-signature-related or blind-signature-related topics on processing multiple digital messages, as exemplified by [37] [38] and [39]; likewise we provide a high-performance solution through a vast amount of digital messages in terms of computational efficiency in Section 5. Another contribution of this study is to show that a direct implementation of this scheme describes a process where ciphertext from one block encryption step gets intermixed with the shifted data point from the next encryption step until the complete sequence of encoded messages is synthesized as an avalanche effect which we present in Section 3.…”
Section: Introductionmentioning
confidence: 59%
See 1 more Smart Citation
“…The main contribution of our work not only significantly strengthens the principles of provable security which we give the results of security analysis in Section 4, as pointed out by [21] [27] and [28], including unforgeability, non-repudiation and unlinkability, but also innovatively offers a model for proxy-signature-related or blind-signature-related topics on processing multiple digital messages, as exemplified by [37] [38] and [39]; likewise we provide a high-performance solution through a vast amount of digital messages in terms of computational efficiency in Section 5. Another contribution of this study is to show that a direct implementation of this scheme describes a process where ciphertext from one block encryption step gets intermixed with the shifted data point from the next encryption step until the complete sequence of encoded messages is synthesized as an avalanche effect which we present in Section 3.…”
Section: Introductionmentioning
confidence: 59%
“…Additionally, the proposed scheme maintains all message blocks to produce the avalanche effect as more and more blocks connect to the subsequent segment, and this security measure is able to prevent information leakage from occurring in each time period. It is worthwhile pointing out that a newly unveiled multiple-document cryptosystem from Tsai and Su's recent works [38] [39] in 2015 and 2017, respectively. Of these two signcryption techniques, the former presents a different type of a threshold signcryption protocol by assigning a group of signatures to share a secret link for multiple documents and their study handles a large number of digital documents via a group of participants splitting a secret and each of member is allocated a share of the secret, but the latter introduces an alternative paradigm for a blind signcryption model (viz.…”
Section: Introductionmentioning
confidence: 99%
“…ECC not only can be used for encryption [6][7][8], but also can be used for authentication [9,10] and key management [11]. Based on ECC, many signcrytion schemes have been proposed [12][13][14][15], which achieve signature and encryption simultaneously. Meanwhile, when facing illegal data usage, none of copyright protection, access control and encryption are enough to ensure information security, so it is essential to turn to the Secret Sharing scheme(SS) [16], which can prevent information from being too centralized and ensure information with more security.…”
Section: Introductionmentioning
confidence: 99%
“…In 2014, Ullah et al [13] proposed blind signcryption scheme based elliptic curve. In 2017, Su and Tsai proposed ECC-based blind signcryption scheme for multiple digital documents [14] and new proxy blind signcryption scheme based on ECC for secure multiple digital message transmission [15]. In 2018, paring-free identity-based blind signature scheme with message recovery [16] was proposed.…”
Section: Introductionmentioning
confidence: 99%