{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T20:01:06Z","timestamp":1775246466097,"version":"3.50.1"},"reference-count":49,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2018,10,9]],"date-time":"2018-10-09T00:00:00Z","timestamp":1539043200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>With the rapid development of modern technology, personal privacy has become a critical concern in many applications. Various digitalized applications such as online voting systems and the electronic cash systems need authenticity and anonymity. Blind signature is an advanced technique that provides the authenticity and anonymity of the user by obtaining a valid signature for a message without revealing its content to the signer. The message recovery property minimizes the signature size and allows efficient communication in situations where bandwidth is limited. With the advantage of blind signature and message recovery properties, in this paper, we present a new pairing free blind signature scheme with message recovery in Identity-based settings. The proposed scheme is proven to be secure in the random oracle model under the assumption that the Elliptic Curve Discrete Logarithm Problem (ECDLP) is intractable. The proposed scheme meets the security requirements such as blindness, untracebility, and unforgeability. We compare our scheme with the well-known existing schemes in the literature, and the efficiency analysis shows that our scheme is more efficient in terms of computational and communicational point of view.<\/jats:p>","DOI":"10.3390\/cryptography2040029","type":"journal-article","created":{"date-parts":[[2018,10,9]],"date-time":"2018-10-09T11:10:44Z","timestamp":1539083444000},"page":"29","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Pairing Free Identity-Based Blind Signature Scheme with Message Recovery"],"prefix":"10.3390","volume":"2","author":[{"given":"Salome","family":"James","sequence":"first","affiliation":[{"name":"Department of Engineering Mathematics, Andhra University, Visakhapatnam 530003, India"}]},{"given":"N.B.","family":"Gayathri","sequence":"additional","affiliation":[{"name":"Department of Engineering Mathematics, Andhra University, Visakhapatnam 530003, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5636-8136","authenticated-orcid":false,"given":"P. Vasudeva","family":"Reddy","sequence":"additional","affiliation":[{"name":"Department of Engineering Mathematics, Andhra University, Visakhapatnam 530003, India"}]}],"member":"1968","published-online":{"date-parts":[[2018,10,9]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","article-title":"New Directions in Cryptography","volume":"22","author":"Diffie","year":"1976","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_2","unstructured":"Shamir, A. (2000, January 20\u201324). Identity-Based Cryptosystems and Signature Schemes. Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques, Santa Barbara, CA, USA."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1016\/j.cose.2006.02.004","article-title":"An anonymous voting mechanism based on the key exchange protocol","volume":"25","author":"Chang","year":"2006","journal-title":"Comput. Secur."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1611","DOI":"10.1016\/j.mcm.2008.05.039","article-title":"An efficient multi-receipt mechanism for uncoercible anonymous electronic voting","volume":"48","author":"Fan","year":"2008","journal-title":"Math. Comput. Model."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/j.cose.2004.01.007","article-title":"A secure electronic voting protocol for general elections","volume":"23","author":"Liaw","year":"2004","journal-title":"Comput. Secur."},{"key":"ref_6","unstructured":"Delaune, S., Kremer, S., and Ryan, M. (2006, January 5\u20137). Coercion-resistance and receipt-freeness in electronic voting. Proceedings of the 19th IEEE Computer Security Foundations Workshop, Venice, Italy."},{"key":"ref_7","unstructured":"Chaum, D. (2018, October 03). Blind Signatures for Untraceable Payments. Available online: https:\/\/link.springer.com\/chapter\/10.1007%2F978-1-4757-0602-4_18#citeas."},{"key":"ref_8","first-page":"319","article-title":"Untraceable electronic cash","volume":"403","author":"Chaum","year":"1990","journal-title":"Adv. Cryptol."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Nyberg, K., and Rueppel, R.A. (1993, January 3\u20135). A New Signature Scheme Based on the DSA Giving Message Recovery. Proceedings of the 1st ACM Conference on Communication and Computer Security, Fairfax, VA, USA.","DOI":"10.1145\/168588.168595"},{"key":"ref_10","first-page":"921","article-title":"An ECC-based blind signature scheme","volume":"5","author":"Jeng","year":"2010","journal-title":"J. Netw."},{"key":"ref_11","first-page":"5403","article-title":"A Blind Signature Based on Discrete Logarithm Problem","volume":"7","author":"Shen","year":"2011","journal-title":"Int. J. Innov. Comput. Inf. Control"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1460","DOI":"10.1093\/comjnl\/bxt069","article-title":"A pairing-based blind signature e-voting scheme","volume":"57","author":"Garcia","year":"2014","journal-title":"Comput. J."},{"key":"ref_13","first-page":"41","article-title":"New ID based fair blind signatures","volume":"3","author":"Verma","year":"2016","journal-title":"Int. J. Current Eng. Sci. Res."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"2","DOI":"10.4172\/2090-4908.1000158","article-title":"A New Cryptographic Voting Verifiable Scheme for E-Voting System Based on Bit Commitment and Blind Signature","volume":"6","author":"Darwish","year":"2017","journal-title":"Int. J. Swarm Intel. Evol. Comput."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"487","DOI":"10.1007\/s11460-011-0119-1","article-title":"ID-based signature scheme from bilinear pairings: A survey","volume":"6","author":"Sahu","year":"2011","journal-title":"Front. Electr. Electron. Eng."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Zhang, F., and Kim, K. (2002, January 1\u20135). ID-based blind signature and ring signature from pairings. Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand.","DOI":"10.1007\/3-540-36178-2_33"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Zhang, F., and Kim, K. (2003, January 9\u201311). Efficient ID-based blind signature and proxy signature. Proceedings of the Australasian Conference on Information Security and Privacy, Sydney, NSW, Australia.","DOI":"10.1007\/3-540-45067-X_27"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Huang, Z., Chen, K., and Wang, Y. (2005, January 14\u201316). Efficient identity-based signatures and blind signatures. Proceedings of the International Conference on Cryptology and Network Security, Xiamen, China.","DOI":"10.1007\/11599371_11"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Zhao, Z., Zhao, Z., Tang, X., and Liu, Y. (2006, January 6\u20139). A New ID-Based Blind Signature from Bilinear Pairings. Proceedings of the 2006 IET International Conference on Wireless, Mobile and Multimedia Networks, Hangzhou, China.","DOI":"10.1049\/cp:20061568"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Kalkan, S., Kaya, K., and Selcuk, A.A. (2008, January 27\u201329). Generalized ID-Based Blind Signatures from Bilinear Pairings. Proceedings of the 23rd International Symposium on Computer and Information Sciences, Istanbul, Turkey.","DOI":"10.1109\/ISCIS.2008.4717895"},{"key":"ref_21","first-page":"98","article-title":"An ID-Based Blind Signature Scheme from Bilinear Pairings","volume":"4","author":"Rao","year":"2010","journal-title":"Int. J. Comput. Sci. Secur."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Hess, F. (2002, January 15\u201316). Efficient identity-based signature schemes based on pairings. Proceedings of the International Workshop on Selected Areas in Cryptography, St. John\u2019s, NF, Canada.","DOI":"10.1007\/3-540-36492-7_20"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1016\/j.camwa.2010.01.021","article-title":"Provably secure randomized blind signature scheme based on bilinear pairing","volume":"60","author":"Fan","year":"2010","journal-title":"Comput. Math. Appl."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Zhang, L., Hu, Y., Tian, X., and Yang, Y. (2010, January 6\u20137). Novel identity-based blind signature for electronic voting system. Proceedings of the 2010 Second International Workshop on Education Technology and Computer Science, Wuhan, China.","DOI":"10.1109\/ETCS.2010.198"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Shakerian, R., Pour, T.M., and Kamali, S.H. (2010, January 9\u201311). An identity based public key cryptography blind signature scheme from bilinear pairings. Proceedings of the 2010 3rd International Conference on Computer Science and Information Technology, Chengdu, China.","DOI":"10.1109\/ICCSIT.2010.5563627"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"444","DOI":"10.1016\/j.compeleceng.2011.05.009","article-title":"An efficient identity-based blind signature scheme without bilinear pairings","volume":"37","author":"He","year":"2011","journal-title":"Comput. Electr. Eng."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Hu, X., Wang, J., and Yang, Y. (2011, January 14\u201315). Secure ID-based blind signature scheme without random oracle. Proceedings of the 2011 International Conference on Network Computing and Information Security, Guilin, China.","DOI":"10.1109\/NCIS.2011.56"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Xu, G., and Xu, G. (2013, January 20\u201322). An ID-based Blind Signature from Bilinear Pairing with Unlinkability. Proceedings of the 3rd International Conference on Consumer Electronics, Communications and Networks, Xianning, China.","DOI":"10.1109\/CECNet.2013.6703282"},{"key":"ref_29","unstructured":"Jain, R.T., and Patel, A.A. (2013). Computationally Efficient ID-Based Blind Signature Scheme in E-Voting. Int. J. Sci. Res. Dev., 1, Available online: https:\/\/s3.amazonaws.com\/academia.edu.documents\/33502839\/IJSRDV1I3034.pdf?AWSAccessKeyId=AKIAIWOWYYGZ2Y53UL3A&Expires=1539744028&Signature=o5N7XWZ%2BVlfugIaaf%2FESsqJzfCc%3D&response-content-disposition=inline%3B%20filename%3DComputationally_Efficient_ID-Based_Blind.pdf."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1016\/j.mcm.2012.07.009","article-title":"Identity-based partially blind signature in the standard model for electronic cash","volume":"58","author":"Li","year":"2013","journal-title":"Math. Comput. Model."},{"key":"ref_31","unstructured":"Pance, R., and Ljupcho, A. (2014, January 26\u201330). Comparison of ID-Based Blind Signatures from Pairings for E-Voting Protocols. Proceedings of the 37th International Convention on Information and Communication Technology, Electronics and Microelectronics, Opatija, Croatia."},{"key":"ref_32","first-page":"2678","article-title":"Survey on Identity Based Blind Signature","volume":"6","author":"Girish","year":"2015","journal-title":"Int. J. Comput. Sci. Inf. Technol."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"3163","DOI":"10.1007\/s13369-016-2115-5","article-title":"Provably Secure Pairing-Free Identity-Based Partially Blind Signature Scheme and Its Application in Online E-Cash System","volume":"41","author":"Islam","year":"2016","journal-title":"Arab. J. Sci. Eng."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"47","DOI":"10.5815\/ijmecs.2017.10.06","article-title":"An Identity-Based Blind Signature Approach for E-Voting System","volume":"10","author":"Kumar","year":"2017","journal-title":"Int. J. Modern Educ. Comput. Sci."},{"key":"ref_35","first-page":"2","article-title":"A Secure ID-Based Blind and Proxy Blind Signature Scheme from Bilinear Pairings","volume":"12","author":"Sarde","year":"2017","journal-title":"J. Appl. Secur. Res."},{"key":"ref_36","first-page":"2602","article-title":"A Pairing-Based Blind Signature Scheme with Message Recovery","volume":"1","author":"Han","year":"2007","journal-title":"Int. J. Inf. Technol."},{"key":"ref_37","first-page":"2","article-title":"A New Blind Identity-Based Signature Scheme with Message Recovery","volume":"2","author":"Hassan","year":"2008","journal-title":"Online J. Electron. Electr. Eng."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"6159","DOI":"10.3923\/itj.2013.6159.6163","article-title":"A New Proxy Blind Signature Scheme with Message Recovery","volume":"12","author":"Diao","year":"2013","journal-title":"Inf. Technol. J."},{"key":"ref_39","first-page":"2674","article-title":"Identity-Based Blind Signature Scheme with Message Recovery","volume":"7","author":"James","year":"2017","journal-title":"Int. J. Electr. Comput. Eng."},{"key":"ref_40","first-page":"150","article-title":"Efficient identity-based blind message recovery signature scheme from pairings","volume":"12","author":"Verma","year":"2018","journal-title":"Inst. Eng. Technol. J."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","article-title":"Elliptic curve cryptosystem","volume":"48","author":"Koblitz","year":"1987","journal-title":"J. Math. Comput."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","article-title":"Use of elliptic curves in cryptography","volume":"218","author":"Miller","year":"1985","journal-title":"Proc. Adv. Cryptol."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1007\/s001450010003","article-title":"Security arguments for digital signatures and blind signatures","volume":"13","author":"Pointcheval","year":"2000","journal-title":"J. Cryptol."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"4136","DOI":"10.1109\/TWC.2007.060255","article-title":"On broadcast authentication in wireless sensor networks","volume":"6","author":"Ren","year":"2007","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"2895","DOI":"10.1016\/j.ins.2010.04.002","article-title":"A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges","volume":"180","author":"Cao","year":"2010","journal-title":"Inf. Sci."},{"key":"ref_46","first-page":"188","article-title":"Java Implementation for Pairing-Based Cryptosystems","volume":"6019","author":"Tan","year":"2010","journal-title":"Proc. Int. Conf. Comput. Sci. Appl."},{"key":"ref_47","unstructured":"Shamus Software Ltd (2018, October 03). Miracl Library. Available online: https:\/\/www.miracl.com."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"601","DOI":"10.1016\/j.csi.2007.01.004","article-title":"ID-based digital signature scheme on the elliptic curve cryptosystem","volume":"29","author":"Chung","year":"2007","journal-title":"Comput. Stand. Interfaces"},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Barreto, P.S.L.M., Libert, B., McCullagh, N., and Quisquater, J.J. (2005, January 4\u20138). Efficient and provably secure identity-based signatures and signcryption from bilinear maps. Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India.","DOI":"10.1007\/11593447_28"}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/2\/4\/29\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T19:09:13Z","timestamp":1775243353000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/2\/4\/29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,9]]},"references-count":49,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2018,12]]}},"alternative-id":["cryptography2040029"],"URL":"https:\/\/doi.org\/10.3390\/cryptography2040029","relation":{},"ISSN":["2410-387X"],"issn-type":[{"value":"2410-387X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,10,9]]}}}