Call for Paper - August 2019 Edition
IJCA solicits original research papers for the August 2019 Edition. Last date of manuscript submission is July 20, 2019. Read More

A Novel Proficient Blind Signature Scheme using ECC

Print
PDF
{/tag}
IJCA Proceedings on International Conference on Emergent Trends in Computing and Communication (ETCC-2014)
© 2014 by IJCA Journal
ETCC - Number 1
Year of Publication: 2014
Authors:
Nitu Singh
Sumanjit Das

Nitu Singh and Sumanjit Das. Article: A Novel Proficient Blind Signature Scheme using ECC. IJCA Proceedings on International Conference on Emergent Trends in Computing and Communication (ETCC-2014) ETCC(1):66-72, September 2014. Full text available. BibTeX

@article{key:article,
	author = {Nitu Singh and Sumanjit Das},
	title = {Article: A Novel Proficient Blind Signature Scheme using ECC},
	journal = {IJCA Proceedings on International Conference on Emergent Trends in Computing and Communication (ETCC-2014)},
	year = {2014},
	volume = {ETCC},
	number = {1},
	pages = {66-72},
	month = {September},
	note = {Full text available}
}

Abstract

Internet has become an Integral part and prime need of every human being in their day to day life. People now prefer to do transaction over the internet than doing it offline as it reduces time consumption. In such scenarios, securing customer data is one of the biggest challenges for software developers. For this reason Security protocols like Blind Signature Scheme came into picture where requester is allowed obtain a signature from the signer who signs a message without reading the content of the message, and cannot link the protocol with the resulting message signature pair. Blind Signature scheme is mostly used for E-commerce applications like Digital payment system, Electronic-voting system as it provides security goals like blindness, untraceability, correctness and nonforgeability. Neal Koblitz and Victor S. Miller has presented Elliptic curve cryptography (ECC) which is an approach to public key cryptography based on algebraic structure of elliptic curves in over finite fields. Elliptic curve cryptosystem is more efficient than other public key cryptosystem due to difficulty in solving elliptic curve discrete logarithm problem. Using the benefits of elliptic curve cryptography we have presented implementation of blind signature scheme using JAVA.

References

  • D. Chaum,"Blind signatures for untraceable payments," Advances in Cryptology, CRYPTO'82, pp. 199-203, 1982.
  • D. Chaum, "Blind signatures system," Advances in Cryptology, CRYPTO'83, pp. 153-156, 1983.
  • V. S. Miller, "Use of Elliptic Curves in ryptography," Advances in Cryptology: Proceedings of Crypto '85, vol. 218, pp. 417-426, 1986.
  • N. Koblitz, "Elliptic Curve Cryptosystems," Mathematics of Computation, vol. 48, no. 177, pp. 203- 209, 1987.
  • S. A. Vanstone, "Elliptic curve cryptosystem-the answer to strong, fast public-key cryptography for securing constrained environments," Information Security Technical Report, vol. 2, no. 2, pp. 78-87, 1997.
  • Ming-Hsin Chang, "Schnorr blind Signature based on Elliptic curve", Asian Journal of Information Tecnology, 2(3), pages 130-134, 2003
  • M. Hwang, C, Lee and Y. Lai, "An untraceable blind Signature scheme," in IEICE Trans. Fundamentals, Vol. E86-A, No 7, pp. 1902-1906, 2003.
  • Hwang Lai Su, An efficient signcryption scheme with forward secrecy based on elliptic curve, Journal of applied mathematics and computation, pages 870-881, 2005.
  • Chwei-Shyong Tsai, Min-Shiang Hwang,Pei-Chen Sung, "Blind Signature Scheme Based on Elliptic Curve Cryptography"
  • Debasish Jena, Sanjay Kumar Jena and Banshidhar Majhi "A Novel Untraceable Blind Signature Based on Elliptic Curve Discrete Logarithm Problem" IJCSNS International Journal of Computer Science and Network Security, VOL. 7 No. 6, June 2007
  • K. H. Huang, Y. F. Chung, C. H. Liu, F. Lai, and T. S. Chen (2007), "Efficient migration for mobile computing in distributed networks," Computer Standards & Interfaces, 2007.
  • Fuh-Gwo Jeng, Tzer-Long Chen, Tzer-Shyong Chen "An ECC-Based Blind Signature Scheme" journal of Networks, VOL. 5, NO. 8, pp. 921-928, August 2010.
  • C. W. Shieh (2006), "An Efficient Design of Elliptic Curve Cryptography Processor," Master Thesis, Tatung University, Taipei, 2006.
  • Y. F. Chung, H. H. Lee, F. Lai, and T. S. Chen (2008), "Access control in user hierarchy based on elliptic curve cryptosystem," Information Sciences, vol. 178, no. 1, pp. 230-243, 2008.
  • MS. Dhanashree M. Kuthe, Prof. Avinash J. Agrawal "Implementation of Blind digital signature using ECC and Zero knowledge protocol" International Journal of Scientific and Research Publications, Volume 2, Issue 9, September 2012.
  • MS. Dhanashree M. Kuthe, Prof. Avinash J. Agrawal "Implementation of Blind digital signature using ECC" International Journal of Computer Science and Network (IJCSN) Volume 1, Issue 5, October 2012.
  • Sumanjit Das and Prasant Sahoo "Cryptoanalysis of signcryption protocols based on Elliptic curve" IJMER, Vol-3, No. 2, Feb 2013.