Identity hiding by blind signature scheme

  • Authors:
  • Salah Albermany;Hamza A. Ali;Abdulameer K. Hussain

  • Affiliations:
  • Computer Science Department, Zarka Private University, Jordan;Computer Science Department, Zarka Private University, Jordan;Computer Science Department, Zarka Private University, Jordan

  • Venue:
  • ICECS'03 Proceedings of the 2nd WSEAS International Conference on Electronics, Control and Signal Processing
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

Public key schemes use two keys, i.e. public key used for encryption and private key used for decryption. But still there is a major problem in these schemes, as cryptanalyst has access to the public key and the sender's identity, which might help him or her to break the system. This paper presents a method for public key hiding, i.e. the public key of the receiver will not be used directly in the encryption process rather a pseudo key will be used. This scheme guarantees reducing the risk of breaking both the encryption algorithm and the public-private key pair. Furthermore, this pseudo public key is generated independent of the sender, i.e. as blind signature is achieved by using another key as well as reduces breaking encryption method. This method is designed and experimented with to fit a group users-group manager environment.