Call for Paper - March 2023 Edition
IJCA solicits original research papers for the March 2023 Edition. Last date of manuscript submission is February 20, 2023. Read More

An Exploitation of Blind Signature Schemes to Simulate Privacy-related Applications

Print
PDF
International Journal of Computer Applications
© 2013 by IJCA Journal
Volume 66 - Number 3
Year of Publication: 2013
Authors:
Kazi Md. Rokibul Alam
Saifuddin Mahmud
Mohammad Nazmul Alam Khan
10.5120/11065-5980

Kazi Md. Rokibul Alam, Saifuddin Mahmud and Mohammad Nazmul Alam Khan. Article: An Exploitation of Blind Signature Schemes to Simulate Privacy-related Applications. International Journal of Computer Applications 66(3):23-27, March 2013. Full text available. BibTeX

@article{key:article,
	author = {Kazi Md. Rokibul Alam and Saifuddin Mahmud and Mohammad Nazmul Alam Khan},
	title = {Article: An Exploitation of Blind Signature Schemes to Simulate Privacy-related Applications},
	journal = {International Journal of Computer Applications},
	year = {2013},
	volume = {66},
	number = {3},
	pages = {23-27},
	month = {March},
	note = {Full text available}
}

Abstract

This paper presents the simulation of privacy-related applications employing blind signature (BS) schemes. Two popular privacy-related applications: 'traditional BS based electronic voting system (EVS)' and 'traditional offline electronic payment protocol (EPP)' have been chosen here. A BS scheme is a cryptographic protocol that plays a vital role to conduct the electronic transactions of privacy-related applications securely but anonymously. It ensures the confidentiality of the private information of a user while she involves in an electronic transaction over the internet. Intuitively, existing BS schemes can be categorized as traceable and untraceable. RSA cryptosystem based two popular schemes from two categories: the scheme of Chaum [1] from traceable schemes and the scheme of Hwang et al. [2] from untraceable schemes have been chosen here for simulation. The upshot of the simulation model is the comparison of computation time requirement of blinding, singing, unblinding and verification operations involved in different steps of privacy-related applications evaluated by the chosen BS schemes.

References

  • D. Chaum, "Blind signatures system," Advances in Cryptology, CRYPTO'83, pp. 153?156, 1983.
  • M. Hwang, C. Lee, and Y. Lai, "An untraceable blind signature scheme," in IEICE Trans. Fundamentals, Vol. E86?A, No. 7, pp. 1902?1906, 2003.
  • E. Mohammed, A. C. Emarah, and K. El?Shennawy, "A blind signature scheme based on ElGamal signature," IEEE/AFCEA EUROCOMM Information Systems for Enhanced Public Safety and Security, pp. 51–53, 2000.
  • D. Jena, S. K. Jena, and B. Majhi, "A novel untraceable blind signature based on elliptic curve discrete logarithm problem," in International Journal of Computer Science and Network Security, Vol. 7, No. 6, pp. 269–275, 2007.
  • Sattar J Aboud, "Secure e–payment protocol," in International journal of Security (IJS), Vol. 3, No. 5, pp. 85–92, 2009.
  • M. Kwon and Y. Cho, "Randomization enhanced blind signature schemes based on RSA," in IEICE Trans. Fundamentals, Vol. E82, No. 1, pp. 1?4, 1999.
  • H. Oros and C. Popescu "A Secure and Ef?cient Off-line Electronic Payment System for Wireless Networks". International Journal of Computers, Communications & Control, ISSN 1841-9836, E-ISSN 1841-9844 Vol. V, No. 4, pp. 551-557, 2010.
  • Fang-Ping Chiang Yi-Mien Lin and Ya-Fen Chang "Comments on the Security Flaw of Hwang et al. 's Blind Signature Scheme" in International Journal of Network Security, Vol. 6, No. 2, pp. 185–189, Mar. 2008
  • Microsoft Visual Studio available at http://www. microsoft. com/visualstudio/en-us/products/2010-editions
  • K. Sampigethaya and R. Poovendran, "A Framework and Taxonomy for Comparison of Electronic Voting Schemes," Elsevier Computers and Security, Vol. 25, pp. 137-153, 2006.