On blind signatures and perfect crimes
Computers and Security
Building and managing virtual private networks
Building and managing virtual private networks
Trustee-based tracing extensions to anonymous cash and the making of anonymous change
Proceedings of the sixth annual ACM-SIAM symposium on Discrete algorithms
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
PGP Companion for Windows
Efficient Electronic Cash with Restricted Privacy
FC '97 Proceedings of the First International Conference on Financial Cryptography
Designing Network Security, Second Edition
Designing Network Security, Second Edition
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Hi-index | 0.00 |
Public key schemes use two keys, i.e. public key used for encryption and private key used for decryption. But still there is a major problem in these schemes, as cryptanalyst has access to the public key and the sender's identity, which might help him or her to break the system. This paper presents a method for public key hiding, i.e. the public key of the receiver will not be used directly in the encryption process rather a pseudo key will be used. This scheme guarantees reducing the risk of breaking both the encryption algorithm and the public-private key pair. Furthermore, this pseudo public key is generated independent of the sender, i.e. as blind signature is achieved by using another key as well as reduces breaking encryption method. This method is designed and experimented with to fit a group users-group manager environment.