CFP last date
20 June 2024
Reseach Article

An Elliptic Curve Arithmetic based Private Credentials System that uses Schnorr Blind Signature Scheme

Published on February 2015 by N.sivaselvan, R.vijaya Arjunan, B.kishore, C.ganesh Babu
Advanced Computing and Communication Techniques for High Performance Applications
Foundation of Computer Science USA
ICACCTHPA2014 - Number 3
February 2015
Authors: N.sivaselvan, R.vijaya Arjunan, B.kishore, C.ganesh Babu
0a95bb20-9252-4c7b-bbf5-bb451a8fe61b

N.sivaselvan, R.vijaya Arjunan, B.kishore, C.ganesh Babu . An Elliptic Curve Arithmetic based Private Credentials System that uses Schnorr Blind Signature Scheme. Advanced Computing and Communication Techniques for High Performance Applications. ICACCTHPA2014, 3 (February 2015), 14-16.

@article{
author = { N.sivaselvan, R.vijaya Arjunan, B.kishore, C.ganesh Babu },
title = { An Elliptic Curve Arithmetic based Private Credentials System that uses Schnorr Blind Signature Scheme },
journal = { Advanced Computing and Communication Techniques for High Performance Applications },
issue_date = { February 2015 },
volume = { ICACCTHPA2014 },
number = { 3 },
month = { February },
year = { 2015 },
issn = 0975-8887,
pages = { 14-16 },
numpages = 3,
url = { /proceedings/icaccthpa2014/number3/19447-6030/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Advanced Computing and Communication Techniques for High Performance Applications
%A N.sivaselvan
%A R.vijaya Arjunan
%A B.kishore
%A C.ganesh Babu
%T An Elliptic Curve Arithmetic based Private Credentials System that uses Schnorr Blind Signature Scheme
%J Advanced Computing and Communication Techniques for High Performance Applications
%@ 0975-8887
%V ICACCTHPA2014
%N 3
%P 14-16
%D 2015
%I International Journal of Computer Applications
Abstract

Privacy breach has become a major dispute in online transactions. In such a system, users give their personal information to get the service and that users' personal information may get wide spread across several organizations. Hence, there is a need for privacy protection. Private credentials offer authentication and authorization based on the traits possessed by a user not on the identity of the user. In this paper, we present a private credentials system that uses Schnorr Blind Signature based on elliptic curves. Elliptic curve defined over a prime field is chosen and ECDLP i. e. , Elliptic Curve Discrete Logarithm Problem is the basis for the system. The properties of randomness, unlinkability, unforgability are preserved. The performance and storage space requirement of our system are compared with that of the cryptographic techniques that use discrete logarithm.

References
  1. Joseph H. Silverman, "The Arithmetic of Elliptic Curves", Graduate Texts of Mathematics, Vol. 106, Springer-Verlag 1986.
  2. Randhir Kumar, Akash Anil, "Implementation of Elliptical Curve Cryptography", International Journal of Computer Science Issues, Vol. 8, Issue 4, No 2, July 2011.
  3. W. Stallings, "Cryptography and Network Security principles and practice", Published by Prentice Hall, 2006.
  4. A. Glenn, I. Goldberg, F. Legare, A. Stiglic, "A Description of Protocols for Private Credentials", Published by Zero-Knowledge Systems Inc. , 2001, pp. 1-10.
  5. A. Lysyanskaya, R. Rivest, A. Sahai, and S. Wolf, "Pseudonym Systems", Selected Areas in Cryptography, H. Heys and C. Adams, Eds. , Springer Verlag, 1999, vol. 1758, Lecture Notes in Computer Science, pp. 184-199.
  6. S. Brands, "Private Credentials", Published by Zero-Knowledge Systems Inc. , 2000, pp. 1- 25.
  7. Aditi Athavale, Kuldip Singh, Sandeep Sood, "Design of a Private Credentials Scheme Based on Elliptic Curve Cryptography", First International Conference on Computational Intelligence, Communication Systems and Networks, 2009.
  8. D. Chaum, "Blind signatures for untraceable payment", Advances in cryptology, CRYPTO'82, Lect. Notes Computer Science, Published by Springer-Verlag, 1998, pp. 199-203.
  9. M. Chang, I. Chen, I. Wu, Y. Yeh, "Schnorr Blind Signature Based on Elliptic Curves", Asian Journal of Information Technology, Published by Grace Publication Network, 2003, pp. 130 -134.
  10. Fuh-Gwo Jeng, Tzer-Long Chen, Tzer-Shyong Chen, "An ECC-Based Blind Signature Scheme", Journal of Networks, Vol. 5 , August 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Elliptic Curve Cryptography Private Credentials Schnorr Blind Signature