JOURNAL ARTICLE

Blind signature protocols based on hidden discrete logarithm problem

Abstract

Introduction: The progress in the development of quantum computing has raised the problem of constructing post-quantum two-key cryptographic algorithms and protocols, i.e. crypto schemes resistant to attacks from quantum computers. Based on the hidden discrete logarithm problem, some practical post-quantum digital signature schemes have been developed. The next step could be the development of post-quantum blind signature protocols. Purpose: To develop blind signature protocols based on the computational difficulty of the hidden discrete logarithm problem. Method: The use of blinding factors introduced by the client during the blind signature protocol when the parameters necessary for the blind signature formation are passed to the signatory. Results: It has been proposed to use blinding multipliers of two different types: left-sided and right-sided ones. With them, you can develop blind signature protocols on the base of schemes with a verification equation defined in non-commutative algebraic structures. New blind signature protocols have been developed, based on the computational difficulty of the hidden discrete logarithm problem. As the algebraic carrier for the developed protocols, finite non-commutative associative algebras of two types are used: 1) those with a global two-sided unit, and 2) those with a large set of global left units. Practical relevance: The proposed protocols have a high performance and can be successfully implemented either in software or in hardware.

Keywords:
Blind signature Discrete logarithm Blinding Computer science Post-quantum cryptography Theoretical computer science Digital signature Cryptography Signature (topology) Cryptographic protocol Protocol (science) Logarithm Hash function Public-key cryptography Algorithm Mathematics Encryption Computer security

Metrics

0
Cited By
0.00
FWCI (Field Weighted Citation Impact)
18
Refs
0.06
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence
Advanced Computational Techniques in Science and Engineering
Physical Sciences →  Computer Science →  Information Systems

Related Documents

JOURNAL ARTICLE

Blind Signature Protocol Based on Hidden Discrete Logarithm Problem Set in a Commutative Algebra

Minh Hiệu NguyễnD. N. MoldovyanNikolay A. MoldovyanMinh‐Ha LeNguyễn Long Giang

Journal:   Iranian Journal of Science and Technology Transactions A Science Year: 2022 Vol: 46 (1)Pages: 323-332
JOURNAL ARTICLE

Blind multi-signature scheme based on factoring and discrete logarithm problem

Duc Nguyen TanHai Nguyen NamMinh Nguyen Hieu

Journal:   TELKOMNIKA (Telecommunication Computing Electronics and Control) Year: 2019 Vol: 17 (5)Pages: 2327-2327
JOURNAL ARTICLE

Blind Signature Schemes Based on the Elliptic Curve Discrete Logarithm Problem

Constantin Popescu

Journal:   Studies in Informatics and Control Year: 2010 Vol: 19 (4)
BOOK-CHAPTER

Hidden signature schemes based on the discrete logarithm problem and related concepts

Patrick HorsterMarkus MichelsHolger Petersen

IFIP advances in information and communication technology Year: 1995 Pages: 160-177
© 2026 ScienceGate Book Chapters — All rights reserved.