CFP last date
20 May 2024
Reseach Article

Cryptanalysis of Blind Signature Schemes

by Nitu Singh, Sumanjit Das
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 71 - Number 19
Year of Publication: 2013
Authors: Nitu Singh, Sumanjit Das
10.5120/12598-9467

Nitu Singh, Sumanjit Das . Cryptanalysis of Blind Signature Schemes. International Journal of Computer Applications. 71, 19 ( June 2013), 39-43. DOI=10.5120/12598-9467

@article{ 10.5120/12598-9467,
author = { Nitu Singh, Sumanjit Das },
title = { Cryptanalysis of Blind Signature Schemes },
journal = { International Journal of Computer Applications },
issue_date = { June 2013 },
volume = { 71 },
number = { 19 },
month = { June },
year = { 2013 },
issn = { 0975-8887 },
pages = { 39-43 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume71/number19/12598-9467/ },
doi = { 10.5120/12598-9467 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:36:05.487521+05:30
%A Nitu Singh
%A Sumanjit Das
%T Cryptanalysis of Blind Signature Schemes
%J International Journal of Computer Applications
%@ 0975-8887
%V 71
%N 19
%P 39-43
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security of the consumer's data over internet is the major problem in present time. In this paper we have analyzed blind signature schemes based on RSA and with taking advantage of elliptic curve cryptography to achieve the security goals. Blind signature scheme is one of the security protocol to obtain signature from a signer such that signer sign the message without reading the content of the message and also he could not link the protocol with the resulting message signature pair [7]. Blind signature scheme is used to achieve certain security goals like blindness, untraceability, authenticity, unforgeability [1]. We have analyzed blind signature scheme to achieve the security goals using Elliptic Curve Cryptosystem. Elliptic curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. The use of elliptic curves in cryptography was initially presented by Neal Koblitz and Victor S. Miller. Elliptic curve cryptosystem has advantages in terms of smaller key size and lower computational overhead in comparison with public key cryptosystem [2]. Many researchers have been presented the secure blind signature scheme with their own goals and limitations. Two properties a blind signature scheme should hold digital signature and blind signature. By using concept of Elliptic Curve Cryptosystem and blinding algorithm, the signer generates the blind signature without reading content of the message [5]. The scheme avoids the collision between different digital signatures generated by the same singer. The blind signature is a secure technique can be applied in e-business and other applications. Blind signature schemes are widely used for various applications of E-commerce like digital payment systems and electronic voting system etc where to maintain the privacy of consumer is necessary [9].

References
  1. Hwang Lai Su. An efficient signcryption scheme with forward secrecy based on elliptic curve. Journal of applied mathematics and computation, pages 870-881, 2005.
  2. Debasish Jena, Sanjay Kumar Jena and Banshidhar Majhi "A Novel Untraceable Blind Signature Based on Elliptic Curve Discrete Logarithm Problem" IJCSNS International Journal of Computer Science and Network Security, VOL. 7 No. 6, June 2007.
  3. Fuh-Gwo Jeng, Tzer-Long Chen, Tzer-Shyong Chen "An ECC-Based Blind Signature Scheme" JOURNAL OF NETWORKS, VOL. 5, NO. 8, pp. 921-928, AUGUST 2010.
  4. MS. DHANASHREE M. KUTHE, PROF. AVINASH J. AGRAWAL "IMPLEMENTATION OF BLIND DIGITAL SIGNATURE USING ECC" International Journal of Computer Science and Network (IJCSN) Volume 1, Issue 5, October 2012.
  5. Sumanjit Das and Biswajit Samal "An Elliptic Curve based Signcryption Protocol using Java" IJCA, Vol-66, No. 4, Mar 2013.
  6. K. H. Huang, Y. F. Chung, C. H. Liu, F. Lai, and T. S. Chen (2007), "Efficient migration for mobile computing in distributed networks," Computer Standards & Interfaces, 2007.
  7. C. W. Shieh (2006), "An Efficient Design of Elliptic Curve Cryptography Processor," Master Thesis, Tatung University, Taipei, 2006.
  8. Y. F. Chung, H. H. Lee, F. Lai, and T. S. Chen (2008), "Access control in user hierarchy based on elliptic curve cryptosystem," Information Sciences, vol. 178, no. 1, pp. 230-243, 2008.
  9. Sumanjit Das and Prasant Sahoo "Cryptoanalysis of signcryption protocols based on Eliptic curve" IJMER, Vol-3, No. 2, Feb 2013.
Index Terms

Computer Science
Information Sciences

Keywords

RSA Blind Signature Digital Signature ECC Security