SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Downloaden Sie, um offline zu lesen
BLIND SIGNATURE SCHEME




              By:
              Asanka Balasooriya
              Kelum Senanayake
BLIND SIGNATURE SCHEME
 “Blind Signature Scheme allows a person to get a
  message signed by another party without revealing
  any information about the message to the other
  party.” – RSA Laboratory
 Introduced by Dr. David Chaum in 1982.

 Typical Analogy from the world of paper documents
       Enclosing a message in a carbon paper lined envelop.
       Writing a signature on the outside of the envelop.
       Leaves a carbon copy of the signature on the paper
        inside the envelop.
       The signer does not view the message content
       But a third party can later verify the signature
ABOUT DR. DAVID CHAUM
   Dr. David Chaum is the inventor of many cryptographic
    protocols, including blind signature schemes,
    commitment schemes, and digital cash.
   He received his Ph.D. in Computer Science, with a minor
    in Business Administration, from the University of
    California at Berkeley.
   In the area of cryptography, he has published over 45
    original technical articles (see list of articles), received
    over 17 US patents.
   Founder of the International Association for
    Cryptographic Research (IACR) In 1982.
   Founder and a member of the Board of Directors of
    DigiCash Inc., a company that has pioneered electronic
    cash innovations.
HOW BLIND SIGNATURE WORKS
   Suppose Alice wants Bob to sign a message m,
    but does not want Bob to know the contents of the
    message.
   Alice "blinds" the message m, with some random
    number b (the blinding factor). This results in
    blind(m,b).
   Bob signs this message, resulting in
    sign(blind(m,b),d), where d is Bob's private key.
   Alice then unblinds the message using b,
    resulting in unblind(sign(blind(m,b),d),b).
   The functions are designed so that this reduces to
    sign(m,d), i.e. Bob's signature on m.
BLIND RSA SIGNATURES
   Assume e is the public RSA exponent, d is the secret
    RSA exponent and N is the RSA modulus.
   Select random value r, such that r is relatively
    prime to N (i.e. gcd(r, N) = 1)
r    is raised to the public exponent e modulo N
 remod   N is used as a blinding factor
 Because r is a random value, remod N is random
    too.
BLIND RSA SIGNATURES… CONT
WHY WOULD BOB SIGN SOMETHING WITHOUT
KNOWING WHAT IT IS?

 A trustee wishes to hold an election by secret
  ballot.
 Each elector is very concerned about keeping his
  vote secret from the trustee.
 Each vote should be signed by the trustee.

 Blind signature solves this problem.
WHY WOULD BOB SIGN SOMETHING WITHOUT
KNOWING WHAT IT IS?

 Untraceable payment system
 Consider a bank, payer and the payee
     A single note will be formed by the payer
     Signed by the bank
     Provided to the payee
     Cleared by the bank
DANGERS OF BLIND SIGNING
 RSA Blinding Attack.
 In RSA the signing process is equivalent to
  decrypting with the signers secret key.
 An attacker can provide a blinded version of a
  message m encrypted with the signers public
  key, m' for them to sign.
 When the attacker unblinds the signed version
  they will have the clear text.
RSA BLINDING ATTACK
RSA BLINDING ATTACK … CONT
 This attack works because in this blind signature
  scheme the signer signs the message directly.
 By contrast, in an traditional signature scheme the
  signer would typically use a padding scheme.
     Signing the result of a Cryptographic hash function
      applied to the message, instead of signing the message
      itself.
     This would produce an incorrect value when unblinded.

   In RSA the same key should never be used for both
    encryption and signing purposes.
REFERENCES
 “Blind Signatures for Untraceable Payments,” D.
  Chaum, Advances in Cryptology Proceedings of
  Crypto 82, D. Chaum, R.L. Rivest, & A.T. Sherman
  (Eds.), Plenum, pp. 199-203.
 RSA Laboratories - 7.3 What is a blind signature
  scheme?[Online]. Available:
  http://www.rsa.com/rsalabs/node.asp?id=2339
 Blind signatures [Online]. Available:
  http://www.cs.bham.ac.uk/~mdr/teaching/modules06/
  netsec/lectures/blind_sigs.html
THANK YOU

Weitere ähnliche Inhalte

Was ist angesagt?

Idea(international data encryption algorithm)
Idea(international data encryption algorithm)Idea(international data encryption algorithm)
Idea(international data encryption algorithm)SAurabh PRajapati
 
Message Authentication Code & HMAC
Message Authentication Code & HMACMessage Authentication Code & HMAC
Message Authentication Code & HMACKrishna Gehlot
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographyMd. Afif Al Mamun
 
PUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONPUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONraf_slide
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptographyRutvik Mehta
 
Digital Signature Standard
Digital Signature StandardDigital Signature Standard
Digital Signature StandardSou Jana
 
CMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signatureCMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signatureAdarsh Patel
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distributionRiya Choudhary
 
12 symmetric key cryptography
12   symmetric key cryptography12   symmetric key cryptography
12 symmetric key cryptographydrewz lin
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanismsRajapriya82
 
Elgamal Digital Signature
Elgamal Digital SignatureElgamal Digital Signature
Elgamal Digital SignatureSou Jana
 

Was ist angesagt? (20)

RSA algorithm
RSA algorithmRSA algorithm
RSA algorithm
 
Cryptography
CryptographyCryptography
Cryptography
 
Idea(international data encryption algorithm)
Idea(international data encryption algorithm)Idea(international data encryption algorithm)
Idea(international data encryption algorithm)
 
Message Authentication Code & HMAC
Message Authentication Code & HMACMessage Authentication Code & HMAC
Message Authentication Code & HMAC
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Digital signature
Digital signatureDigital signature
Digital signature
 
PUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONPUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTION
 
S/MIME
S/MIMES/MIME
S/MIME
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptography
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Email security
Email securityEmail security
Email security
 
Digital Signature Standard
Digital Signature StandardDigital Signature Standard
Digital Signature Standard
 
CMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signatureCMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signature
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
 
12 symmetric key cryptography
12   symmetric key cryptography12   symmetric key cryptography
12 symmetric key cryptography
 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanisms
 
Elgamal Digital Signature
Elgamal Digital SignatureElgamal Digital Signature
Elgamal Digital Signature
 
Diffiehellman
DiffiehellmanDiffiehellman
Diffiehellman
 

Andere mochten auch

Blinding: History and Current Issues
Blinding: History and Current IssuesBlinding: History and Current Issues
Blinding: History and Current IssuesMary K.D. D'Rozario
 
Digital Signature
Digital SignatureDigital Signature
Digital SignatureIsni Wida
 
Blockchan For Developers
Blockchan For DevelopersBlockchan For Developers
Blockchan For DevelopersAlex Chepurnoy
 
Bitcoin - Introduction, Technical Aspects and Ongoing Developments
Bitcoin - Introduction, Technical Aspects and Ongoing DevelopmentsBitcoin - Introduction, Technical Aspects and Ongoing Developments
Bitcoin - Introduction, Technical Aspects and Ongoing DevelopmentsBernhard Haslhofer
 
Các hệ thống thanh toán điện tử
Các hệ thống thanh toán điện tửCác hệ thống thanh toán điện tử
Các hệ thống thanh toán điện tửTrong Hoang
 
thương mại điện tử và thanh toán điện tử
thương mại điện tử và thanh toán điện tửthương mại điện tử và thanh toán điện tử
thương mại điện tử và thanh toán điện tửPhuong Anh Vuong
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-CommerceHiep Luong
 
Clinical Research Methodology
Clinical  Research  MethodologyClinical  Research  Methodology
Clinical Research Methodologydrmomusa
 
Online voting system
Online voting systemOnline voting system
Online voting systemPooja Jain
 
E-Voting Technology
E-Voting TechnologyE-Voting Technology
E-Voting TechnologyGautam Kumar
 
Online voting system project
Online voting system projectOnline voting system project
Online voting system projectsnauriyal1994
 
Online voting system ppt by anoop
Online voting system ppt by anoopOnline voting system ppt by anoop
Online voting system ppt by anoopAnoop Kumar
 
Key Concepts of Clinical Research & Clinical Trial
Key Concepts of Clinical Research & Clinical Trial Key Concepts of Clinical Research & Clinical Trial
Key Concepts of Clinical Research & Clinical Trial SWAROOP KUMAR K
 
Quy chuẩn làm powerpoint
Quy chuẩn làm powerpointQuy chuẩn làm powerpoint
Quy chuẩn làm powerpointNguyễn Thân
 
Clinical research ppt,
Clinical research   ppt,Clinical research   ppt,
Clinical research ppt,Malay Singh
 

Andere mochten auch (20)

Blinding: History and Current Issues
Blinding: History and Current IssuesBlinding: History and Current Issues
Blinding: History and Current Issues
 
DigiCash
DigiCashDigiCash
DigiCash
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Blockchan For Developers
Blockchan For DevelopersBlockchan For Developers
Blockchan For Developers
 
Bitcoin - Introduction, Technical Aspects and Ongoing Developments
Bitcoin - Introduction, Technical Aspects and Ongoing DevelopmentsBitcoin - Introduction, Technical Aspects and Ongoing Developments
Bitcoin - Introduction, Technical Aspects and Ongoing Developments
 
Các hệ thống thanh toán điện tử
Các hệ thống thanh toán điện tửCác hệ thống thanh toán điện tử
Các hệ thống thanh toán điện tử
 
thương mại điện tử và thanh toán điện tử
thương mại điện tử và thanh toán điện tửthương mại điện tử và thanh toán điện tử
thương mại điện tử và thanh toán điện tử
 
Research methodology
Research methodologyResearch methodology
Research methodology
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-Commerce
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Clinical Research Methodology
Clinical  Research  MethodologyClinical  Research  Methodology
Clinical Research Methodology
 
Online voting system
Online voting systemOnline voting system
Online voting system
 
E-Voting Technology
E-Voting TechnologyE-Voting Technology
E-Voting Technology
 
Online voting system project
Online voting system projectOnline voting system project
Online voting system project
 
Online voting system ppt by anoop
Online voting system ppt by anoopOnline voting system ppt by anoop
Online voting system ppt by anoop
 
Ppt on online voting
Ppt on online votingPpt on online voting
Ppt on online voting
 
Key Concepts of Clinical Research & Clinical Trial
Key Concepts of Clinical Research & Clinical Trial Key Concepts of Clinical Research & Clinical Trial
Key Concepts of Clinical Research & Clinical Trial
 
Quy chuẩn làm powerpoint
Quy chuẩn làm powerpointQuy chuẩn làm powerpoint
Quy chuẩn làm powerpoint
 
Clinical research ppt,
Clinical research   ppt,Clinical research   ppt,
Clinical research ppt,
 
Experimental Studies
Experimental StudiesExperimental Studies
Experimental Studies
 

Ähnlich wie Blind Signature Scheme

Steganography flooding
Steganography floodingSteganography flooding
Steganography floodingHENI BHUNGALIA
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and readingmisbanausheenparvam
 
Network securities cn
Network securities cnNetwork securities cn
Network securities cnDhaval Bhatia
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxAkashBhosale50
 
Cryptography chap#6.pptx
Cryptography chap#6.pptxCryptography chap#6.pptx
Cryptography chap#6.pptxHamnaMalik31
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementationAkash Jadhav
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overviewppd1961
 
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)IOSR Journals
 
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)IOSR Journals
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)Soham Kansodaria
 
Information and data security digital signatures
Information and data security digital signaturesInformation and data security digital signatures
Information and data security digital signaturesMazin Alwaaly
 
Review on variants of Security aware AODV
Review on variants of Security aware AODVReview on variants of Security aware AODV
Review on variants of Security aware AODVijsrd.com
 
Generation of Anonymous Signature and Message using Identity Based Group Blin...
Generation of Anonymous Signature and Message using Identity Based Group Blin...Generation of Anonymous Signature and Message using Identity Based Group Blin...
Generation of Anonymous Signature and Message using Identity Based Group Blin...IDES Editor
 

Ähnlich wie Blind Signature Scheme (20)

1329 n 9460
1329 n 94601329 n 9460
1329 n 9460
 
Steganography flooding
Steganography floodingSteganography flooding
Steganography flooding
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
 
Network securities cn
Network securities cnNetwork securities cn
Network securities cn
 
Crypt
CryptCrypt
Crypt
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
 
Em24873876
Em24873876Em24873876
Em24873876
 
Cryptography chap#6.pptx
Cryptography chap#6.pptxCryptography chap#6.pptx
Cryptography chap#6.pptx
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overview
 
Criptography
CriptographyCriptography
Criptography
 
MAT255_Final_Paper_RSA_Encryption
MAT255_Final_Paper_RSA_EncryptionMAT255_Final_Paper_RSA_Encryption
MAT255_Final_Paper_RSA_Encryption
 
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
 
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
 
E017212836
E017212836E017212836
E017212836
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
 
Information and data security digital signatures
Information and data security digital signaturesInformation and data security digital signatures
Information and data security digital signatures
 
Review on variants of Security aware AODV
Review on variants of Security aware AODVReview on variants of Security aware AODV
Review on variants of Security aware AODV
 
Generation of Anonymous Signature and Message using Identity Based Group Blin...
Generation of Anonymous Signature and Message using Identity Based Group Blin...Generation of Anonymous Signature and Message using Identity Based Group Blin...
Generation of Anonymous Signature and Message using Identity Based Group Blin...
 

Mehr von Kelum Senanayake

Couchbase - Yet Another Introduction
Couchbase - Yet Another IntroductionCouchbase - Yet Another Introduction
Couchbase - Yet Another IntroductionKelum Senanayake
 
What you need to know about GC
What you need to know about GCWhat you need to know about GC
What you need to know about GCKelum Senanayake
 
A Searchable Symmetric Key Cipher System
A Searchable Symmetric Key Cipher SystemA Searchable Symmetric Key Cipher System
A Searchable Symmetric Key Cipher SystemKelum Senanayake
 
EJB 3.0 - Yet Another Introduction
EJB 3.0 - Yet Another IntroductionEJB 3.0 - Yet Another Introduction
EJB 3.0 - Yet Another IntroductionKelum Senanayake
 
Security Risks & Vulnerabilities in Skype
Security Risks & Vulnerabilities in SkypeSecurity Risks & Vulnerabilities in Skype
Security Risks & Vulnerabilities in SkypeKelum Senanayake
 
The NFS Version 4 Protocol
The NFS Version 4 ProtocolThe NFS Version 4 Protocol
The NFS Version 4 ProtocolKelum Senanayake
 

Mehr von Kelum Senanayake (10)

Couchbase - Yet Another Introduction
Couchbase - Yet Another IntroductionCouchbase - Yet Another Introduction
Couchbase - Yet Another Introduction
 
Node.js Introduction
Node.js IntroductionNode.js Introduction
Node.js Introduction
 
What you need to know about GC
What you need to know about GCWhat you need to know about GC
What you need to know about GC
 
A Searchable Symmetric Key Cipher System
A Searchable Symmetric Key Cipher SystemA Searchable Symmetric Key Cipher System
A Searchable Symmetric Key Cipher System
 
EJB 3.0 - Yet Another Introduction
EJB 3.0 - Yet Another IntroductionEJB 3.0 - Yet Another Introduction
EJB 3.0 - Yet Another Introduction
 
Security Risks & Vulnerabilities in Skype
Security Risks & Vulnerabilities in SkypeSecurity Risks & Vulnerabilities in Skype
Security Risks & Vulnerabilities in Skype
 
The NFS Version 4 Protocol
The NFS Version 4 ProtocolThe NFS Version 4 Protocol
The NFS Version 4 Protocol
 
Knight's Tour
Knight's TourKnight's Tour
Knight's Tour
 
GPU Programming with Java
GPU Programming with JavaGPU Programming with Java
GPU Programming with Java
 
How to Share a Secret
How to Share a SecretHow to Share a Secret
How to Share a Secret
 

Kürzlich hochgeladen

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 

Kürzlich hochgeladen (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 

Blind Signature Scheme

  • 1. BLIND SIGNATURE SCHEME By: Asanka Balasooriya Kelum Senanayake
  • 2. BLIND SIGNATURE SCHEME  “Blind Signature Scheme allows a person to get a message signed by another party without revealing any information about the message to the other party.” – RSA Laboratory  Introduced by Dr. David Chaum in 1982.  Typical Analogy from the world of paper documents  Enclosing a message in a carbon paper lined envelop.  Writing a signature on the outside of the envelop.  Leaves a carbon copy of the signature on the paper inside the envelop.  The signer does not view the message content  But a third party can later verify the signature
  • 3. ABOUT DR. DAVID CHAUM  Dr. David Chaum is the inventor of many cryptographic protocols, including blind signature schemes, commitment schemes, and digital cash.  He received his Ph.D. in Computer Science, with a minor in Business Administration, from the University of California at Berkeley.  In the area of cryptography, he has published over 45 original technical articles (see list of articles), received over 17 US patents.  Founder of the International Association for Cryptographic Research (IACR) In 1982.  Founder and a member of the Board of Directors of DigiCash Inc., a company that has pioneered electronic cash innovations.
  • 4. HOW BLIND SIGNATURE WORKS  Suppose Alice wants Bob to sign a message m, but does not want Bob to know the contents of the message.  Alice "blinds" the message m, with some random number b (the blinding factor). This results in blind(m,b).  Bob signs this message, resulting in sign(blind(m,b),d), where d is Bob's private key.  Alice then unblinds the message using b, resulting in unblind(sign(blind(m,b),d),b).  The functions are designed so that this reduces to sign(m,d), i.e. Bob's signature on m.
  • 5. BLIND RSA SIGNATURES  Assume e is the public RSA exponent, d is the secret RSA exponent and N is the RSA modulus.  Select random value r, such that r is relatively prime to N (i.e. gcd(r, N) = 1) r is raised to the public exponent e modulo N  remod N is used as a blinding factor  Because r is a random value, remod N is random too.
  • 7. WHY WOULD BOB SIGN SOMETHING WITHOUT KNOWING WHAT IT IS?  A trustee wishes to hold an election by secret ballot.  Each elector is very concerned about keeping his vote secret from the trustee.  Each vote should be signed by the trustee.  Blind signature solves this problem.
  • 8. WHY WOULD BOB SIGN SOMETHING WITHOUT KNOWING WHAT IT IS?  Untraceable payment system  Consider a bank, payer and the payee  A single note will be formed by the payer  Signed by the bank  Provided to the payee  Cleared by the bank
  • 9. DANGERS OF BLIND SIGNING  RSA Blinding Attack.  In RSA the signing process is equivalent to decrypting with the signers secret key.  An attacker can provide a blinded version of a message m encrypted with the signers public key, m' for them to sign.  When the attacker unblinds the signed version they will have the clear text.
  • 11. RSA BLINDING ATTACK … CONT  This attack works because in this blind signature scheme the signer signs the message directly.  By contrast, in an traditional signature scheme the signer would typically use a padding scheme.  Signing the result of a Cryptographic hash function applied to the message, instead of signing the message itself.  This would produce an incorrect value when unblinded.  In RSA the same key should never be used for both encryption and signing purposes.
  • 12. REFERENCES  “Blind Signatures for Untraceable Payments,” D. Chaum, Advances in Cryptology Proceedings of Crypto 82, D. Chaum, R.L. Rivest, & A.T. Sherman (Eds.), Plenum, pp. 199-203.  RSA Laboratories - 7.3 What is a blind signature scheme?[Online]. Available: http://www.rsa.com/rsalabs/node.asp?id=2339  Blind signatures [Online]. Available: http://www.cs.bham.ac.uk/~mdr/teaching/modules06/ netsec/lectures/blind_sigs.html