{"date_updated":"2021-01-12T08:01:09Z","month":"11","page":"627 - 661","doi":"10.3233/JCS-130477","day":"22","publication":"Journal of Computer Security","author":[{"first_name":"Olivier","last_name":"Blazy","full_name":"Blazy, Olivier"},{"id":"46B4C3EE-F248-11E8-B48F-1D18A9856A87","full_name":"Fuchsbauer, Georg","last_name":"Fuchsbauer","first_name":"Georg"},{"first_name":"David","last_name":"Pointcheval","full_name":"Pointcheval, David"},{"last_name":"Vergnaud","first_name":"Damien","full_name":"Vergnaud, Damien"}],"type":"journal_article","abstract":[{"text":"Blind signatures allow users to obtain signatures on messages hidden from the signer; moreover, the signer cannot link the resulting message/signature pair to the signing session. This paper presents blind signature schemes, in which the number of interactions between the user and the signer is minimal and whose blind signatures are short. Our schemes are defined over bilinear groups and are proved secure in the common-reference-string model without random oracles and under standard assumptions: CDH and the decision-linear assumption. (We also give variants over asymmetric groups based on similar assumptions.) The blind signatures are Waters signatures, which consist of 2 group elements. Moreover, we instantiate partially blind signatures, where the message consists of a part hidden from the signer and a commonly known public part, and schemes achieving perfect blindness. We propose new variants of blind signatures, such as signer-friendly partially blind signatures, where the public part can be chosen by the signer without prior agreement, 3-party blind signatures, as well as blind signatures on multiple aggregated messages provided by independent sources. We also extend Waters signatures to non-binary alphabets by proving a new result on the underlying hash function. ","lang":"eng"}],"language":[{"iso":"eng"}],"department":[{"_id":"KrPi"}],"_id":"502","issue":"5","citation":{"chicago":"Blazy, Olivier, Georg Fuchsbauer, David Pointcheval, and Damien Vergnaud. “Short Blind Signatures.” Journal of Computer Security. IOS Press, 2013. https://doi.org/10.3233/JCS-130477.","apa":"Blazy, O., Fuchsbauer, G., Pointcheval, D., & Vergnaud, D. (2013). Short blind signatures. Journal of Computer Security. IOS Press. https://doi.org/10.3233/JCS-130477","ista":"Blazy O, Fuchsbauer G, Pointcheval D, Vergnaud D. 2013. Short blind signatures. Journal of Computer Security. 21(5), 627–661.","ama":"Blazy O, Fuchsbauer G, Pointcheval D, Vergnaud D. Short blind signatures. Journal of Computer Security. 2013;21(5):627-661. doi:10.3233/JCS-130477","short":"O. Blazy, G. Fuchsbauer, D. Pointcheval, D. Vergnaud, Journal of Computer Security 21 (2013) 627–661.","mla":"Blazy, Olivier, et al. “Short Blind Signatures.” Journal of Computer Security, vol. 21, no. 5, IOS Press, 2013, pp. 627–61, doi:10.3233/JCS-130477.","ieee":"O. Blazy, G. Fuchsbauer, D. Pointcheval, and D. Vergnaud, “Short blind signatures,” Journal of Computer Security, vol. 21, no. 5. IOS Press, pp. 627–661, 2013."},"date_published":"2013-11-22T00:00:00Z","publication_status":"published","scopus_import":1,"publisher":"IOS Press","year":"2013","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","volume":21,"date_created":"2018-12-11T11:46:50Z","publist_id":"7318","oa_version":"None","intvolume":" 21","status":"public","quality_controlled":"1","title":"Short blind signatures"}