To search, Click below search items.

 

All Published Papers Search Service

Title

Cryptanalysis of Blind Signature Schemes

Author

Nitu Singh, Sumanjit Das

Citation

Vol. 14  No. 5  pp. 73-77

Abstract

Security of the consumer¡¯s data over internet is the major problem in present time. In this paper we have analyzed blind signature schemes based on RSA and with taking advantage of elliptic curve cryptography to achieve the security goals. Blind signature scheme is one of the security protocol to obtain signature from a signer such that signer sign the message without reading the content of the message and also he could not link the protocol with the resulting message signature pair. Blind signature scheme is used to achieve certain security goals like blindness, untraceability, authenticity, unforgeability. We have analyzed blind signature scheme to achieve the security goals using Elliptic Curve Cryptosystem. Elliptic curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. The use of elliptic curves in cryptography was initially presented by Neal Koblitz and Victor S. Miller. Elliptic curve cryptosystem has advantages in terms of smaller key size and lower computational overhead in comparison with public key cryptosystem. Many researchers have been presented the secure blind signature scheme with their own goals and limitations. Two properties a blind signature scheme should hold digital signature and blind signature. By using concept of Elliptic Curve Cryptosystem and blinding algorithm, the signer generates the blind signature without reading content of the message. The scheme avoids the collision between different digital signatures generated by the same singer. The blind signature is a secure technique can be applied in e-business and other applications. Blind signature schemes are widely used for various applications of E-commerce like digital payment systems and electronic voting system etc where to maintain the privacy of consumer is necessary

Keywords

RSA, Blind Signature, Digital Signature, ECC, Security

URL

http://paper.ijcsns.org/07_book/201405/20140513.pdf