Your browser does not support JavaScript!

Cryptanalysis and improvement of blind signcryption scheme based on elliptic curve

Cryptanalysis and improvement of blind signcryption scheme based on elliptic curve

For access to this article, please select a purchase option:

Buy article PDF
(plus tax if applicable)
Buy Knowledge Pack
10 articles for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
Electronics Letters — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Blind signcryption schemes are the extension of signcryption schemes. They are used to protect the privacy and identity of the sender from other users, especially in electronic voting and electronic cash payment systems. A number of blind signcryption schemes are introduced over the years and some of them are proved to be insecure. In this Letter, the authors analysed a recently proposed blind signcryption scheme based on elliptic curves and proved it is insecure. Their analysis showed that the proposed scheme is unable to provide the claimed security attributes of message integrity, authentication, unforgeability, and signer non-repudiation. After successful cryptanalysis, they introduced a modified version of this scheme to overcome the security flaws and weakness.


    1. 1)
      • 20. Tsai, C.H., Su, P.C.: ‘An ECC-based blind signcryption scheme for multiple digital documents’, Secur. Commun. Netw., 2017, 2017, pp. 114.
    2. 2)
    3. 3)
    4. 4)
    5. 5)
    6. 6)
    7. 7)
      • 12. Dhanashree, M., Agrawal, M.P.J.: ‘Implementation of blind digital signature using ECC’, Int. J. Comput. Sci. Netw., 2012, 2, (9), pp. 316319.
    8. 8)
    9. 9)
      • 10. Chaum, D.: ‘Blind signatures for untraceable payments’, in Chaum, , D., Rivest, , R.L., Sherman, , A.T. (Eds.): ‘Advances in Cryptology: Proceedings of Crypto 82’ (Springer, Boston, MA, USA, 1983), pp. 199203.
    10. 10)
      • 8. Cheng, L., Wen, Q.: ‘An improved certificate less signcryption in the standard model’, Int. J. Netw. Secur., 2015, 17, (3), pp. 229237.
    11. 11)
      • 17. Iqbal, W., Afzal, M., Ahmad, F.: ‘An efficient elliptic curve based signcryption scheme for firewalls’. 2nd National Conf. on Information Assurance (NCIA), Rawalpindi, Pakistan, December 2013, pp. 6772.
    12. 12)
      • 19. Su, P.C., Tsai, C.H.: ‘New proxy blind signcryption scheme for secure multiple digital messages transmission based on elliptic curve cryptography’, KSII Transactions on Internet and Information Systems, 2017, 11, (11), pp. 55375555.
    13. 13)
      • 11. Pointcheval, D., Stern, J.: ‘New blind signatures equivalent to factorization’. 4th ACM Conf. on Computer and Communications Security, Zurich, Switzerland, April 1997, pp. 9299.
    14. 14)
    15. 15)
      • 14. Chakraborty, K., Mehta, J.: ‘A stamped blind signature scheme based on elliptic curve discrete logarithm problem’, Int. J. Netw. Secur., 2012, 14, (6), pp. 316319.
    16. 16)
      • 21. Ullah, R., Nizamuddin, A.I., Amin, N.: ‘Blind signcryption scheme based on elliptic curve’. IEEE Conf. on Information Assurance and Cyber Seccurity (CIACS), Rawalpindi, Pakistan, June 2014, pp. 5154.
    17. 17)
      • 13. Awasthi, A.K., Lal, S.: ‘An efficient scheme for sensitive message transmission using blind signcryption’, 2005, arXiv preprint cs/0504095.
    18. 18)
      • 6. Zheng, Y.: ‘Digital signcryption or how to achieve cost (signature and encryption) cost (signature)+cost (encryption)’, 17th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 2017, pp. 165179.
    19. 19)
      • 15. Yu, H.-F., Tian, L.-Q., Wang, Z.-C.: ‘Self-certified proxy blind signcryption scheme from pairings’. Proc. 2011 IEEE Int. Conf. on Network Computing and Information Security, Guilin, China, May 2011, pp. 316320.
    20. 20)
    21. 21)

Related content

This is a required field
Please enter a valid email address