본문 바로가기
HOME> 논문 > 논문 검색상세

논문 상세정보

서명 요청자의 계산량을 감소시키는 RSA에 기반한 개선된 부분은닉서명 알고리즘
RSA-Based Enhanced Partially Blind Signature Algorithm Minimizing Computation Of The Signature Requester

권문상   (서울대학교 컴퓨터공학과UU0000691  ); 조유근   (서울대학교 컴퓨터공학과UU0000691  );
  • 초록

    '부분은닉서명(Partially Blind Signature)'기법은 전자화폐나 전자투표와 같이 사용자의 프라이버시가 중요시되는 응용에서 사용된다. 본 논문에서는 서명 요청자의 계산량을 줄이는 RSA 알고리즘에 기반한 부분은닉서명 기법을 제안한다. 서명 요청자는 메시지를 은닉하여 서명자에게 전송하고 서명자가 생성한 중간 서명으로부터 최종 서명을 생성하는 과정에서 계산을 필요로 한다. 논문에서 제안하고 있는 기법은 서명 요청자가 적은 계산량을 필요로 하는 모듈러 합과 곱 연산만으로 최종 서명을 계산할 수 있게 하므로 서명 요청자의 계산량을 많이 감소시킨다. 따라서, 이동통신 기기나 스마트카드, 전자지갑 같이 계산능력이 떨어지는 장치들에서 사용하기에 적합하다.


    Partially blind signature scheme is used in applications such as electronic cash and electronic voting where the privacy of the signature requester is important. This paper proposes an RSA-based enhanced partially blind signature scheme minimizing the amount of computation of the signature requester. The signature requester needs computation in blinding the message to the signer and in generating the final signature using the intermediate signature generated by the signer. Since the proposed scheme enables the signature requester to get the final signature just by using modular additions and multiplications, it decreases computation of the signature requester considerably. So, the proposed partially blind signature scheme is adequate for devices such as mobile device, smart-card, and electronic purse that have relatively low computing power.


  • 주제어

    부분은닉서명 .   인닉서명.  

  • 참고문헌 (29)

    1. Rivest, R.L., 'MD5 Message-Digest Algorithm,' IETF RFC 1321, Apr. 1992 
    2. FIPS 180-1., 'Secure Hash Standard,' NIST.US Dept. of Commerce, 1995 
    3. Desmedt, Y. and Odlyzko, A.M., 'A chosen text attack on the RSA cryptosystem and some discrete logarithms schemes,' Advances in Cryptology-Crypto'85 (H. C. Williams, ed.), Lecture Notes in Computer Science, Vol.218, Springer Verlag, pp. 516-521, 1986 
    4. Rabin, M., 'Digitalized Signatures and Public-Key Functions as Intractable as Factorization,' MIT Technical Report, MIT/LCS/TR-212, 1979 
    5. Fan, C.I. and Lei, C.L., 'Low-Computation Blind Signature Schemes Based on Quadratic Residues,' IEE Electronics Letters, Vol.32, No.17, pp. 1569-1570, 1996 
    6. Fan, C.I. and Lei, C.L., 'User efficient blind signatures,' Electronics Letters, Vol.34, No.6, pp. 544-546, 1998 
    7. Menezes, A.J., Ooschot, P.C. and Vanstone, S.A., 'Handbook of Applied Cryptography,' Boca Raton, ISBN:0-8493-8523-7, pp. 74-75, 1997 
    8. Shao, Z., 'Improved user efficient blind signatures,' Electronics Letters, Vol.36, No. 16, pp. 1372-1374, 2000 
    9. Fan, C.I. and Lei, C.L., 'Cryptanalysis on improved user efficient blind signatures,' Electronics Letters, Vol.37, No.10, pp. 630-631, 2001 
    10. Pointcheval, D. and Stern, J., 'Provably Secure Blind Signature scheme,' Advances in Crytology - Asiacrypt'96;Lecture Notes in Computer Science 1163, Springer Verlag, pp. 252-265, 1996 
    11. Chen, C.Y., Chang, C.C. and Yang, W.P., 'Hybrid method for modular exponentiation with precomputation,' Electronics Letters, Vol.32, No.6, pp. 540-541, 1990 
    12. Fan, C.I. and Lei, C.L., 'An Efficient Blind Signature Schemes Based on Quadratic Residues,' IEE Electronics Letters, Vol32, No.9, pp. 814-816, 1996 
    13. Schnorr, C.P., 'Efficient Identification and Signatures for Smart Cards,' In G. Brassard, editor, Advances in Cryptology - CRYPTO'89;Lecture Notes in Computer Science, Santa-Barbara, California, Springer Verlag, pp. 235-251, 1990 
    14. Horster, P., Michels, M. and Petersen, H., 'Meta Message recovery and Meta Blind signature schemes based on the discrete lograrithm problem and their applications,' Advences in Cryptology - Asiacrypt '94, University of Wollongong, NSW, Australia, Nov. 28 - Dec. 1st, 12 pages, 1994 
    15. Horster, P., Michels, M and Petersen, H., 'Meta-ElGamal signature schemes,' Proc. 2 ACM conference on Computer and Communications security, Fairfax, Virginia, 2-4, pp. 96-107, Nov. 1994 
    16. Horster, P., Michels. M. and Petersen, H., 'Efficient blind signature schemes based on the discrete logarithm problem,' Technical Report TR-94-6, University of Technology Chemnitz-Zwickau, 4 pages, Jun 1994 
    17. Horster, P., Petersen, H. and Michels, M., 'Meta message recovery and meta blinded signature schemes based on the discrete logarithm problem and their applications,' Advances in Cryptology - Asiacrypt'94;Lecture Notes in Computer Science 1163, Springer Verlag, pp. 185-196, 1994 
    18. 서문석,김광조, 'KCDSA 및 EC-KCDSA에 근간한 은닉 서명,' Conference on Information Security and Cryptology (CISC'99), Vol. 9, No.1, pp. 141-150, 1999 
    19. ElGamal, T., 'A Public Key Cryptosystem and a Signature Scheme based on Discrete Logarithms,' IEEE Transactions on Information Theory, Vol.31, No.4, pp. 469-472, Jul. 1985 
    20. KCDSA Task Force Team., 'KCDSA : The Korean Certicate-based Digital Signature Algorithm,' Contribution to IEEE P1363a, August 1998 
    21. Camenisch, J.L., Piveteau. J-M. and Stadler, M.A., 'Blind Signatures Based on the Discrete Logarithm Problem,' Proc. Eurocrypt'94, Springer Verlag, pp. 428-432, 1994 
    22. Nyberg, K. and Rueppel, R., 'A new signature scheme based on the DSA giving message recovery,' Proc. 1st ACM Conference on Computer and Communications Security, Fairfax, Virginia, 4 pages, Nov. pp. 3-5, 1993 
    23. National Institute of Standards and Technology, 'Digital signature standard (DSS),' Federal Information Processing Standards Publication FIPS PUB 186, U.S. Department of Commerce, May 1994 
    24. Chien, H.Y., Jan, J.K. and Tseng, Y.M., 'RSA-Based Partially Blind Signature with Low Computation,' Proceedings of the Eighth International Conference on Parallel and Distributed Systems, pp. 385-389, 2001 
    25. Fan, C.I. and Lei, C.L., 'Low-computation partially blind signatures for electronic cash,' IEICE Trans. Fundamentals, Vol.E-81-A, No.5, pp.818-824, 1998 
    26. Horster, P. and Petersen, H., 'Classfication of blind signature schemes and examples of hidden and weak blind signatures,' Presented at the Rump Session of Eurocrypt '94, Perugia, Italy, 6pages, 1994 
    27. Abe, M. and Fujisaki, E., 'How to Date Blind Signatures,' Advances in Crytology Asiacrypt'96, Lecture Notes in Computer Science 1163, Springer Verlag, pp. 244-251, 1996 
    28. Chaum, D., 'Blind Signature System,' In D. Chaum editor, Advances in Cryptology - CRYPTO'83;Lecture Notes in Computer Science, Springer-Verlag, pp. 153-153, 1984 
    29. Chaum, D., 'Blind Signatures for Untraceable Payments,' Advances in Cryptology CRYPTO'82;Lecture Notes in Computer Science, Springer-Verlag, pp. 199-203, 1983 

 저자의 다른 논문

 활용도 분석

  • 상세보기

    amChart 영역
  • 원문보기

    amChart 영역

원문보기

무료다운로드
  • NDSL :
유료다운로드

유료 다운로드의 경우 해당 사이트의 정책에 따라 신규 회원가입, 로그인, 유료 구매 등이 필요할 수 있습니다. 해당 사이트에서 발생하는 귀하의 모든 정보활동은 NDSL의 서비스 정책과 무관합니다.

원문복사신청을 하시면, 일부 해외 인쇄학술지의 경우 외국학술지지원센터(FRIC)에서
무료 원문복사 서비스를 제공합니다.

NDSL에서는 해당 원문을 복사서비스하고 있습니다. 위의 원문복사신청 또는 장바구니 담기를 통하여 원문복사서비스 이용이 가능합니다.

이 논문과 함께 출판된 논문 + 더보기