We achieve blind signatures by a different concept of blinding: Instead of blinding the message, we blind the public key, such that generating a (blind) signature for the blinded key requires the interaction of the holder of the original secret key. To verify the blind signature, the connection between the original and the blinded key is proven by a static ZK proof. The major ingredient for our conversion is the PKP protocol by Shamir.
Category / Keywords: cryptographic protocols / Post-Quantum Cryptography, blind signatures, codes, lat- Date: received 1 Mar 2009 Contact author: overbeck at terra es Available format(s): PDF | BibTeX Citation Version: 20090302:085441 (All versions of this report) Short URL: ia.cr/2009/102