Security Analysis Of User Efficient Blind Signatures

Tj Cao,Dd Lin,R Xue
DOI: https://doi.org/10.1007/978-3-540-30483-8_21
2004-01-01
Abstract:Blind signature schemes allow a person to get a message signed by another party without revealing any information about the message to the other party. To believe the message contains a certain form, cut and choose protocol and partially blind signature protocol are used to prevent cheating. In electronic cash system, unconditional anonymity may be misused for criminal activities such as blackmailing and money laundering. Fair electronic cash schemes are introduced for preventing these fraudulent activities. In this paper, we point out a weakness in Fan and Lei's user efficient blind signatures. Utilizing this weakness, a user can cheat the signer in cut and choose protocol, and the user can also break Fan and Lei's low-computation partially blind signature scheme and Yu et al.'s user efficient fair e-cash scheme.
What problem does this paper attempt to address?