CFP last date
22 April 2024
Reseach Article

A Novel Proficient Blind Signature Scheme using ECC

Published on September 2014 by Nitu Singh, Sumanjit Das
International Conference on Emergent Trends in Computing and Communication
Foundation of Computer Science USA
ETCC - Number 1
September 2014
Authors: Nitu Singh, Sumanjit Das
b39e5cfd-6d5c-44de-b613-89a506c92df0

Nitu Singh, Sumanjit Das . A Novel Proficient Blind Signature Scheme using ECC. International Conference on Emergent Trends in Computing and Communication. ETCC, 1 (September 2014), 66-72.

@article{
author = { Nitu Singh, Sumanjit Das },
title = { A Novel Proficient Blind Signature Scheme using ECC },
journal = { International Conference on Emergent Trends in Computing and Communication },
issue_date = { September 2014 },
volume = { ETCC },
number = { 1 },
month = { September },
year = { 2014 },
issn = 0975-8887,
pages = { 66-72 },
numpages = 7,
url = { /proceedings/etcc/number1/17905-1417/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Emergent Trends in Computing and Communication
%A Nitu Singh
%A Sumanjit Das
%T A Novel Proficient Blind Signature Scheme using ECC
%J International Conference on Emergent Trends in Computing and Communication
%@ 0975-8887
%V ETCC
%N 1
%P 66-72
%D 2014
%I International Journal of Computer Applications
Abstract

Internet has become an Integral part and prime need of every human being in their day to day life. People now prefer to do transaction over the internet than doing it offline as it reduces time consumption. In such scenarios, securing customer data is one of the biggest challenges for software developers. For this reason Security protocols like Blind Signature Scheme came into picture where requester is allowed obtain a signature from the signer who signs a message without reading the content of the message, and cannot link the protocol with the resulting message signature pair. Blind Signature scheme is mostly used for E-commerce applications like Digital payment system, Electronic-voting system as it provides security goals like blindness, untraceability, correctness and nonforgeability. Neal Koblitz and Victor S. Miller has presented Elliptic curve cryptography (ECC) which is an approach to public key cryptography based on algebraic structure of elliptic curves in over finite fields. Elliptic curve cryptosystem is more efficient than other public key cryptosystem due to difficulty in solving elliptic curve discrete logarithm problem. Using the benefits of elliptic curve cryptography we have presented implementation of blind signature scheme using JAVA.

References
  1. D. Chaum,"Blind signatures for untraceable payments," Advances in Cryptology, CRYPTO'82, pp. 199-203, 1982.
  2. D. Chaum, "Blind signatures system," Advances in Cryptology, CRYPTO'83, pp. 153-156, 1983.
  3. V. S. Miller, "Use of Elliptic Curves in ryptography," Advances in Cryptology: Proceedings of Crypto '85, vol. 218, pp. 417-426, 1986.
  4. N. Koblitz, "Elliptic Curve Cryptosystems," Mathematics of Computation, vol. 48, no. 177, pp. 203- 209, 1987.
  5. S. A. Vanstone, "Elliptic curve cryptosystem-the answer to strong, fast public-key cryptography for securing constrained environments," Information Security Technical Report, vol. 2, no. 2, pp. 78-87, 1997.
  6. Ming-Hsin Chang, "Schnorr blind Signature based on Elliptic curve", Asian Journal of Information Tecnology, 2(3), pages 130-134, 2003
  7. M. Hwang, C, Lee and Y. Lai, "An untraceable blind Signature scheme," in IEICE Trans. Fundamentals, Vol. E86-A, No 7, pp. 1902-1906, 2003.
  8. Hwang Lai Su, An efficient signcryption scheme with forward secrecy based on elliptic curve, Journal of applied mathematics and computation, pages 870-881, 2005.
  9. Chwei-Shyong Tsai, Min-Shiang Hwang,Pei-Chen Sung, "Blind Signature Scheme Based on Elliptic Curve Cryptography"
  10. Debasish Jena, Sanjay Kumar Jena and Banshidhar Majhi "A Novel Untraceable Blind Signature Based on Elliptic Curve Discrete Logarithm Problem" IJCSNS International Journal of Computer Science and Network Security, VOL. 7 No. 6, June 2007
  11. K. H. Huang, Y. F. Chung, C. H. Liu, F. Lai, and T. S. Chen (2007), "Efficient migration for mobile computing in distributed networks," Computer Standards & Interfaces, 2007.
  12. Fuh-Gwo Jeng, Tzer-Long Chen, Tzer-Shyong Chen "An ECC-Based Blind Signature Scheme" journal of Networks, VOL. 5, NO. 8, pp. 921-928, August 2010.
  13. C. W. Shieh (2006), "An Efficient Design of Elliptic Curve Cryptography Processor," Master Thesis, Tatung University, Taipei, 2006.
  14. Y. F. Chung, H. H. Lee, F. Lai, and T. S. Chen (2008), "Access control in user hierarchy based on elliptic curve cryptosystem," Information Sciences, vol. 178, no. 1, pp. 230-243, 2008.
  15. MS. Dhanashree M. Kuthe, Prof. Avinash J. Agrawal "Implementation of Blind digital signature using ECC and Zero knowledge protocol" International Journal of Scientific and Research Publications, Volume 2, Issue 9, September 2012.
  16. MS. Dhanashree M. Kuthe, Prof. Avinash J. Agrawal "Implementation of Blind digital signature using ECC" International Journal of Computer Science and Network (IJCSN) Volume 1, Issue 5, October 2012.
  17. Sumanjit Das and Prasant Sahoo "Cryptoanalysis of signcryption protocols based on Elliptic curve" IJMER, Vol-3, No. 2, Feb 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Digital Signature Blind Signature Elliptic Curve Cryptosystem (ecc) E-cash System.