CFP last date
22 April 2024
Reseach Article

An Exploitation of Blind Signature Schemes to Simulate Privacy-related Applications

by Kazi Md. Rokibul Alam, Saifuddin Mahmud, Mohammad Nazmul Alam Khan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 66 - Number 3
Year of Publication: 2013
Authors: Kazi Md. Rokibul Alam, Saifuddin Mahmud, Mohammad Nazmul Alam Khan
10.5120/11065-5980

Kazi Md. Rokibul Alam, Saifuddin Mahmud, Mohammad Nazmul Alam Khan . An Exploitation of Blind Signature Schemes to Simulate Privacy-related Applications. International Journal of Computer Applications. 66, 3 ( March 2013), 23-27. DOI=10.5120/11065-5980

@article{ 10.5120/11065-5980,
author = { Kazi Md. Rokibul Alam, Saifuddin Mahmud, Mohammad Nazmul Alam Khan },
title = { An Exploitation of Blind Signature Schemes to Simulate Privacy-related Applications },
journal = { International Journal of Computer Applications },
issue_date = { March 2013 },
volume = { 66 },
number = { 3 },
month = { March },
year = { 2013 },
issn = { 0975-8887 },
pages = { 23-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume66/number3/11065-5980/ },
doi = { 10.5120/11065-5980 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:21:22.151409+05:30
%A Kazi Md. Rokibul Alam
%A Saifuddin Mahmud
%A Mohammad Nazmul Alam Khan
%T An Exploitation of Blind Signature Schemes to Simulate Privacy-related Applications
%J International Journal of Computer Applications
%@ 0975-8887
%V 66
%N 3
%P 23-27
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper presents the simulation of privacy-related applications employing blind signature (BS) schemes. Two popular privacy-related applications: 'traditional BS based electronic voting system (EVS)' and 'traditional offline electronic payment protocol (EPP)' have been chosen here. A BS scheme is a cryptographic protocol that plays a vital role to conduct the electronic transactions of privacy-related applications securely but anonymously. It ensures the confidentiality of the private information of a user while she involves in an electronic transaction over the internet. Intuitively, existing BS schemes can be categorized as traceable and untraceable. RSA cryptosystem based two popular schemes from two categories: the scheme of Chaum [1] from traceable schemes and the scheme of Hwang et al. [2] from untraceable schemes have been chosen here for simulation. The upshot of the simulation model is the comparison of computation time requirement of blinding, singing, unblinding and verification operations involved in different steps of privacy-related applications evaluated by the chosen BS schemes.

References
  1. D. Chaum, "Blind signatures system," Advances in Cryptology, CRYPTO'83, pp. 153?156, 1983.
  2. M. Hwang, C. Lee, and Y. Lai, "An untraceable blind signature scheme," in IEICE Trans. Fundamentals, Vol. E86?A, No. 7, pp. 1902?1906, 2003.
  3. E. Mohammed, A. C. Emarah, and K. El?Shennawy, "A blind signature scheme based on ElGamal signature," IEEE/AFCEA EUROCOMM Information Systems for Enhanced Public Safety and Security, pp. 51–53, 2000.
  4. D. Jena, S. K. Jena, and B. Majhi, "A novel untraceable blind signature based on elliptic curve discrete logarithm problem," in International Journal of Computer Science and Network Security, Vol. 7, No. 6, pp. 269–275, 2007.
  5. Sattar J Aboud, "Secure e–payment protocol," in International journal of Security (IJS), Vol. 3, No. 5, pp. 85–92, 2009.
  6. M. Kwon and Y. Cho, "Randomization enhanced blind signature schemes based on RSA," in IEICE Trans. Fundamentals, Vol. E82, No. 1, pp. 1?4, 1999.
  7. H. Oros and C. Popescu "A Secure and Ef?cient Off-line Electronic Payment System for Wireless Networks". International Journal of Computers, Communications & Control, ISSN 1841-9836, E-ISSN 1841-9844 Vol. V, No. 4, pp. 551-557, 2010.
  8. Fang-Ping Chiang Yi-Mien Lin and Ya-Fen Chang "Comments on the Security Flaw of Hwang et al. 's Blind Signature Scheme" in International Journal of Network Security, Vol. 6, No. 2, pp. 185–189, Mar. 2008
  9. Microsoft Visual Studio available at http://www. microsoft. com/visualstudio/en-us/products/2010-editions
  10. K. Sampigethaya and R. Poovendran, "A Framework and Taxonomy for Comparison of Electronic Voting Schemes," Elsevier Computers and Security, Vol. 25, pp. 137-153, 2006.
Index Terms

Computer Science
Information Sciences

Keywords

Blind Signature Scheme Untraceability Electronic Voting System Electronic Payment Protocol