SlideShare a Scribd company logo
BLIND SIGNATURE SCHEME




              By:
              Asanka Balasooriya
              Kelum Senanayake
BLIND SIGNATURE SCHEME
 “Blind Signature Scheme allows a person to get a
  message signed by another party without revealing
  any information about the message to the other
  party.” – RSA Laboratory
 Introduced by Dr. David Chaum in 1982.

 Typical Analogy from the world of paper documents
       Enclosing a message in a carbon paper lined envelop.
       Writing a signature on the outside of the envelop.
       Leaves a carbon copy of the signature on the paper
        inside the envelop.
       The signer does not view the message content
       But a third party can later verify the signature
ABOUT DR. DAVID CHAUM
   Dr. David Chaum is the inventor of many cryptographic
    protocols, including blind signature schemes,
    commitment schemes, and digital cash.
   He received his Ph.D. in Computer Science, with a minor
    in Business Administration, from the University of
    California at Berkeley.
   In the area of cryptography, he has published over 45
    original technical articles (see list of articles), received
    over 17 US patents.
   Founder of the International Association for
    Cryptographic Research (IACR) In 1982.
   Founder and a member of the Board of Directors of
    DigiCash Inc., a company that has pioneered electronic
    cash innovations.
HOW BLIND SIGNATURE WORKS
   Suppose Alice wants Bob to sign a message m,
    but does not want Bob to know the contents of the
    message.
   Alice "blinds" the message m, with some random
    number b (the blinding factor). This results in
    blind(m,b).
   Bob signs this message, resulting in
    sign(blind(m,b),d), where d is Bob's private key.
   Alice then unblinds the message using b,
    resulting in unblind(sign(blind(m,b),d),b).
   The functions are designed so that this reduces to
    sign(m,d), i.e. Bob's signature on m.
BLIND RSA SIGNATURES
   Assume e is the public RSA exponent, d is the secret
    RSA exponent and N is the RSA modulus.
   Select random value r, such that r is relatively
    prime to N (i.e. gcd(r, N) = 1)
r    is raised to the public exponent e modulo N
 remod   N is used as a blinding factor
 Because r is a random value, remod N is random
    too.
BLIND RSA SIGNATURES… CONT
WHY WOULD BOB SIGN SOMETHING WITHOUT
KNOWING WHAT IT IS?

 A trustee wishes to hold an election by secret
  ballot.
 Each elector is very concerned about keeping his
  vote secret from the trustee.
 Each vote should be signed by the trustee.

 Blind signature solves this problem.
WHY WOULD BOB SIGN SOMETHING WITHOUT
KNOWING WHAT IT IS?

 Untraceable payment system
 Consider a bank, payer and the payee
     A single note will be formed by the payer
     Signed by the bank
     Provided to the payee
     Cleared by the bank
DANGERS OF BLIND SIGNING
 RSA Blinding Attack.
 In RSA the signing process is equivalent to
  decrypting with the signers secret key.
 An attacker can provide a blinded version of a
  message m encrypted with the signers public
  key, m' for them to sign.
 When the attacker unblinds the signed version
  they will have the clear text.
RSA BLINDING ATTACK
RSA BLINDING ATTACK … CONT
 This attack works because in this blind signature
  scheme the signer signs the message directly.
 By contrast, in an traditional signature scheme the
  signer would typically use a padding scheme.
     Signing the result of a Cryptographic hash function
      applied to the message, instead of signing the message
      itself.
     This would produce an incorrect value when unblinded.

   In RSA the same key should never be used for both
    encryption and signing purposes.
REFERENCES
 “Blind Signatures for Untraceable Payments,” D.
  Chaum, Advances in Cryptology Proceedings of
  Crypto 82, D. Chaum, R.L. Rivest, & A.T. Sherman
  (Eds.), Plenum, pp. 199-203.
 RSA Laboratories - 7.3 What is a blind signature
  scheme?[Online]. Available:
  http://www.rsa.com/rsalabs/node.asp?id=2339
 Blind signatures [Online]. Available:
  http://www.cs.bham.ac.uk/~mdr/teaching/modules06/
  netsec/lectures/blind_sigs.html
THANK YOU
Ad

More Related Content

What's hot (20)

RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
Sathish Kumar
 
Diffie-hellman algorithm
Diffie-hellman algorithmDiffie-hellman algorithm
Diffie-hellman algorithm
Computer_ at_home
 
Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithm
Sunita Kharayat
 
Digital Signature Standard
Digital Signature StandardDigital Signature Standard
Digital Signature Standard
Sou Jana
 
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSA
Dr.Florence Dayana
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
Vasuki Ramasamy
 
Cryptography
CryptographyCryptography
Cryptography
Darshini Parikh
 
Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmPublic Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithm
Indra97065
 
Rsa algorithm key generation
Rsa algorithm key generation Rsa algorithm key generation
Rsa algorithm key generation
swarnapatil
 
kerberos
kerberoskerberos
kerberos
sameer farooq
 
Elgamal digital signature
Elgamal digital signatureElgamal digital signature
Elgamal digital signature
MDKAWSARAHMEDSAGAR
 
Rsa
RsaRsa
Rsa
ismaelhaider
 
Principles of public key cryptography and its Uses
Principles of  public key cryptography and its UsesPrinciples of  public key cryptography and its Uses
Principles of public key cryptography and its Uses
Mohsin Ali
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Popescu Petre
 
Elgamal_digital_signature_scheme.pptx
Elgamal_digital_signature_scheme.pptxElgamal_digital_signature_scheme.pptx
Elgamal_digital_signature_scheme.pptx
Karim Monir
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Md. Afif Al Mamun
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
Soham Kansodaria
 
Cryptography
CryptographyCryptography
Cryptography
Rutuja Solkar
 
Rsa
RsaRsa
Rsa
Navneet Sharma
 
Public-Key Cryptography.pptx
Public-Key Cryptography.pptxPublic-Key Cryptography.pptx
Public-Key Cryptography.pptx
AbdulRehman970300
 
Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithm
Sunita Kharayat
 
Digital Signature Standard
Digital Signature StandardDigital Signature Standard
Digital Signature Standard
Sou Jana
 
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSA
Dr.Florence Dayana
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
Vasuki Ramasamy
 
Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmPublic Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithm
Indra97065
 
Rsa algorithm key generation
Rsa algorithm key generation Rsa algorithm key generation
Rsa algorithm key generation
swarnapatil
 
Principles of public key cryptography and its Uses
Principles of  public key cryptography and its UsesPrinciples of  public key cryptography and its Uses
Principles of public key cryptography and its Uses
Mohsin Ali
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Popescu Petre
 
Elgamal_digital_signature_scheme.pptx
Elgamal_digital_signature_scheme.pptxElgamal_digital_signature_scheme.pptx
Elgamal_digital_signature_scheme.pptx
Karim Monir
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Md. Afif Al Mamun
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
Soham Kansodaria
 
Public-Key Cryptography.pptx
Public-Key Cryptography.pptxPublic-Key Cryptography.pptx
Public-Key Cryptography.pptx
AbdulRehman970300
 

Viewers also liked (20)

Blinding: History and Current Issues
Blinding: History and Current IssuesBlinding: History and Current Issues
Blinding: History and Current Issues
Mary K.D. D'Rozario
 
DigiCash
DigiCashDigiCash
DigiCash
David Evans
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
Isni Wida
 
Blockchan For Developers
Blockchan For DevelopersBlockchan For Developers
Blockchan For Developers
Alex Chepurnoy
 
Bitcoin - Introduction, Technical Aspects and Ongoing Developments
Bitcoin - Introduction, Technical Aspects and Ongoing DevelopmentsBitcoin - Introduction, Technical Aspects and Ongoing Developments
Bitcoin - Introduction, Technical Aspects and Ongoing Developments
Bernhard Haslhofer
 
Các hệ thống thanh toán điện tử
Các hệ thống thanh toán điện tửCác hệ thống thanh toán điện tử
Các hệ thống thanh toán điện tử
Trong Hoang
 
thương mại điện tử và thanh toán điện tử
thương mại điện tử và thanh toán điện tửthương mại điện tử và thanh toán điện tử
thương mại điện tử và thanh toán điện tử
Phuong Anh Vuong
 
Research methodology
Research methodologyResearch methodology
Research methodology
Dr Alok Mishra
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-Commerce
Hiep Luong
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
Dr. Shashank Shetty
 
Clinical Research Methodology
Clinical  Research  MethodologyClinical  Research  Methodology
Clinical Research Methodology
drmomusa
 
Message Authentication Code & HMAC
Message Authentication Code & HMACMessage Authentication Code & HMAC
Message Authentication Code & HMAC
Krishna Gehlot
 
Online voting system
Online voting systemOnline voting system
Online voting system
Pooja Jain
 
E-Voting Technology
E-Voting TechnologyE-Voting Technology
E-Voting Technology
Gautam Kumar
 
Online voting system project
Online voting system projectOnline voting system project
Online voting system project
snauriyal1994
 
Online voting system ppt by anoop
Online voting system ppt by anoopOnline voting system ppt by anoop
Online voting system ppt by anoop
Anoop Kumar
 
Ppt on online voting
Ppt on online votingPpt on online voting
Ppt on online voting
Debapriyo Dasgupta
 
Key Concepts of Clinical Research & Clinical Trial
Key Concepts of Clinical Research & Clinical Trial Key Concepts of Clinical Research & Clinical Trial
Key Concepts of Clinical Research & Clinical Trial
SWAROOP KUMAR K
 
Quy chuẩn làm powerpoint
Quy chuẩn làm powerpointQuy chuẩn làm powerpoint
Quy chuẩn làm powerpoint
Nguyễn Thân
 
Clinical research ppt,
Clinical research   ppt,Clinical research   ppt,
Clinical research ppt,
Malay Singh
 
Blinding: History and Current Issues
Blinding: History and Current IssuesBlinding: History and Current Issues
Blinding: History and Current Issues
Mary K.D. D'Rozario
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
Isni Wida
 
Blockchan For Developers
Blockchan For DevelopersBlockchan For Developers
Blockchan For Developers
Alex Chepurnoy
 
Bitcoin - Introduction, Technical Aspects and Ongoing Developments
Bitcoin - Introduction, Technical Aspects and Ongoing DevelopmentsBitcoin - Introduction, Technical Aspects and Ongoing Developments
Bitcoin - Introduction, Technical Aspects and Ongoing Developments
Bernhard Haslhofer
 
Các hệ thống thanh toán điện tử
Các hệ thống thanh toán điện tửCác hệ thống thanh toán điện tử
Các hệ thống thanh toán điện tử
Trong Hoang
 
thương mại điện tử và thanh toán điện tử
thương mại điện tử và thanh toán điện tửthương mại điện tử và thanh toán điện tử
thương mại điện tử và thanh toán điện tử
Phuong Anh Vuong
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-Commerce
Hiep Luong
 
Clinical Research Methodology
Clinical  Research  MethodologyClinical  Research  Methodology
Clinical Research Methodology
drmomusa
 
Message Authentication Code & HMAC
Message Authentication Code & HMACMessage Authentication Code & HMAC
Message Authentication Code & HMAC
Krishna Gehlot
 
Online voting system
Online voting systemOnline voting system
Online voting system
Pooja Jain
 
E-Voting Technology
E-Voting TechnologyE-Voting Technology
E-Voting Technology
Gautam Kumar
 
Online voting system project
Online voting system projectOnline voting system project
Online voting system project
snauriyal1994
 
Online voting system ppt by anoop
Online voting system ppt by anoopOnline voting system ppt by anoop
Online voting system ppt by anoop
Anoop Kumar
 
Key Concepts of Clinical Research & Clinical Trial
Key Concepts of Clinical Research & Clinical Trial Key Concepts of Clinical Research & Clinical Trial
Key Concepts of Clinical Research & Clinical Trial
SWAROOP KUMAR K
 
Quy chuẩn làm powerpoint
Quy chuẩn làm powerpointQuy chuẩn làm powerpoint
Quy chuẩn làm powerpoint
Nguyễn Thân
 
Clinical research ppt,
Clinical research   ppt,Clinical research   ppt,
Clinical research ppt,
Malay Singh
 
Ad

Similar to Blind Signature Scheme (20)

Digital signature
Digital signatureDigital signature
Digital signature
Hossain Md Shakhawat
 
1329 n 9460
1329 n 94601329 n 9460
1329 n 9460
kicknit123
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
Rohit Bhat
 
Steganography flooding
Steganography floodingSteganography flooding
Steganography flooding
HENI BHUNGALIA
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
OECLIB Odisha Electronics Control Library
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
misbanausheenparvam
 
Network securities cn
Network securities cnNetwork securities cn
Network securities cn
Dhaval Bhatia
 
Crypt
CryptCrypt
Crypt
Mir Majid
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
AkashBhosale50
 
Em24873876
Em24873876Em24873876
Em24873876
IJERA Editor
 
Cryptography chap#6.pptx
Cryptography chap#6.pptxCryptography chap#6.pptx
Cryptography chap#6.pptx
HamnaMalik31
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
Akash Jadhav
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overview
ppd1961
 
Criptography
CriptographyCriptography
Criptography
Sajan Sahu
 
MAT255_Final_Paper_RSA_Encryption
MAT255_Final_Paper_RSA_EncryptionMAT255_Final_Paper_RSA_Encryption
MAT255_Final_Paper_RSA_Encryption
Xudong Brandon Liang
 
E017212836
E017212836E017212836
E017212836
IOSR Journals
 
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
IOSR Journals
 
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
IOSR Journals
 
Information and data security digital signatures
Information and data security digital signaturesInformation and data security digital signatures
Information and data security digital signatures
Mazin Alwaaly
 
Review on variants of Security aware AODV
Review on variants of Security aware AODVReview on variants of Security aware AODV
Review on variants of Security aware AODV
ijsrd.com
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
Rohit Bhat
 
Steganography flooding
Steganography floodingSteganography flooding
Steganography flooding
HENI BHUNGALIA
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
misbanausheenparvam
 
Network securities cn
Network securities cnNetwork securities cn
Network securities cn
Dhaval Bhatia
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
AkashBhosale50
 
Cryptography chap#6.pptx
Cryptography chap#6.pptxCryptography chap#6.pptx
Cryptography chap#6.pptx
HamnaMalik31
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
Akash Jadhav
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overview
ppd1961
 
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
IOSR Journals
 
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
IOSR Journals
 
Information and data security digital signatures
Information and data security digital signaturesInformation and data security digital signatures
Information and data security digital signatures
Mazin Alwaaly
 
Review on variants of Security aware AODV
Review on variants of Security aware AODVReview on variants of Security aware AODV
Review on variants of Security aware AODV
ijsrd.com
 
Ad

More from Kelum Senanayake (10)

Couchbase - Yet Another Introduction
Couchbase - Yet Another IntroductionCouchbase - Yet Another Introduction
Couchbase - Yet Another Introduction
Kelum Senanayake
 
Node.js Introduction
Node.js IntroductionNode.js Introduction
Node.js Introduction
Kelum Senanayake
 
What you need to know about GC
What you need to know about GCWhat you need to know about GC
What you need to know about GC
Kelum Senanayake
 
A Searchable Symmetric Key Cipher System
A Searchable Symmetric Key Cipher SystemA Searchable Symmetric Key Cipher System
A Searchable Symmetric Key Cipher System
Kelum Senanayake
 
EJB 3.0 - Yet Another Introduction
EJB 3.0 - Yet Another IntroductionEJB 3.0 - Yet Another Introduction
EJB 3.0 - Yet Another Introduction
Kelum Senanayake
 
Security Risks & Vulnerabilities in Skype
Security Risks & Vulnerabilities in SkypeSecurity Risks & Vulnerabilities in Skype
Security Risks & Vulnerabilities in Skype
Kelum Senanayake
 
The NFS Version 4 Protocol
The NFS Version 4 ProtocolThe NFS Version 4 Protocol
The NFS Version 4 Protocol
Kelum Senanayake
 
Knight's Tour
Knight's TourKnight's Tour
Knight's Tour
Kelum Senanayake
 
GPU Programming with Java
GPU Programming with JavaGPU Programming with Java
GPU Programming with Java
Kelum Senanayake
 
How to Share a Secret
How to Share a SecretHow to Share a Secret
How to Share a Secret
Kelum Senanayake
 
Couchbase - Yet Another Introduction
Couchbase - Yet Another IntroductionCouchbase - Yet Another Introduction
Couchbase - Yet Another Introduction
Kelum Senanayake
 
What you need to know about GC
What you need to know about GCWhat you need to know about GC
What you need to know about GC
Kelum Senanayake
 
A Searchable Symmetric Key Cipher System
A Searchable Symmetric Key Cipher SystemA Searchable Symmetric Key Cipher System
A Searchable Symmetric Key Cipher System
Kelum Senanayake
 
EJB 3.0 - Yet Another Introduction
EJB 3.0 - Yet Another IntroductionEJB 3.0 - Yet Another Introduction
EJB 3.0 - Yet Another Introduction
Kelum Senanayake
 
Security Risks & Vulnerabilities in Skype
Security Risks & Vulnerabilities in SkypeSecurity Risks & Vulnerabilities in Skype
Security Risks & Vulnerabilities in Skype
Kelum Senanayake
 
The NFS Version 4 Protocol
The NFS Version 4 ProtocolThe NFS Version 4 Protocol
The NFS Version 4 Protocol
Kelum Senanayake
 

Recently uploaded (20)

Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath MaestroDev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
UiPathCommunity
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
Quantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur MorganQuantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
Build Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For DevsBuild Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For Devs
Brian McKeiver
 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Impelsys Inc.
 
Drupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy ConsumptionDrupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy Consumption
Exove
 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath MaestroDev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
UiPathCommunity
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
Quantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur MorganQuantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
Build Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For DevsBuild Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For Devs
Brian McKeiver
 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Impelsys Inc.
 
Drupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy ConsumptionDrupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy Consumption
Exove
 

Blind Signature Scheme

  • 1. BLIND SIGNATURE SCHEME By: Asanka Balasooriya Kelum Senanayake
  • 2. BLIND SIGNATURE SCHEME  “Blind Signature Scheme allows a person to get a message signed by another party without revealing any information about the message to the other party.” – RSA Laboratory  Introduced by Dr. David Chaum in 1982.  Typical Analogy from the world of paper documents  Enclosing a message in a carbon paper lined envelop.  Writing a signature on the outside of the envelop.  Leaves a carbon copy of the signature on the paper inside the envelop.  The signer does not view the message content  But a third party can later verify the signature
  • 3. ABOUT DR. DAVID CHAUM  Dr. David Chaum is the inventor of many cryptographic protocols, including blind signature schemes, commitment schemes, and digital cash.  He received his Ph.D. in Computer Science, with a minor in Business Administration, from the University of California at Berkeley.  In the area of cryptography, he has published over 45 original technical articles (see list of articles), received over 17 US patents.  Founder of the International Association for Cryptographic Research (IACR) In 1982.  Founder and a member of the Board of Directors of DigiCash Inc., a company that has pioneered electronic cash innovations.
  • 4. HOW BLIND SIGNATURE WORKS  Suppose Alice wants Bob to sign a message m, but does not want Bob to know the contents of the message.  Alice "blinds" the message m, with some random number b (the blinding factor). This results in blind(m,b).  Bob signs this message, resulting in sign(blind(m,b),d), where d is Bob's private key.  Alice then unblinds the message using b, resulting in unblind(sign(blind(m,b),d),b).  The functions are designed so that this reduces to sign(m,d), i.e. Bob's signature on m.
  • 5. BLIND RSA SIGNATURES  Assume e is the public RSA exponent, d is the secret RSA exponent and N is the RSA modulus.  Select random value r, such that r is relatively prime to N (i.e. gcd(r, N) = 1) r is raised to the public exponent e modulo N  remod N is used as a blinding factor  Because r is a random value, remod N is random too.
  • 7. WHY WOULD BOB SIGN SOMETHING WITHOUT KNOWING WHAT IT IS?  A trustee wishes to hold an election by secret ballot.  Each elector is very concerned about keeping his vote secret from the trustee.  Each vote should be signed by the trustee.  Blind signature solves this problem.
  • 8. WHY WOULD BOB SIGN SOMETHING WITHOUT KNOWING WHAT IT IS?  Untraceable payment system  Consider a bank, payer and the payee  A single note will be formed by the payer  Signed by the bank  Provided to the payee  Cleared by the bank
  • 9. DANGERS OF BLIND SIGNING  RSA Blinding Attack.  In RSA the signing process is equivalent to decrypting with the signers secret key.  An attacker can provide a blinded version of a message m encrypted with the signers public key, m' for them to sign.  When the attacker unblinds the signed version they will have the clear text.
  • 11. RSA BLINDING ATTACK … CONT  This attack works because in this blind signature scheme the signer signs the message directly.  By contrast, in an traditional signature scheme the signer would typically use a padding scheme.  Signing the result of a Cryptographic hash function applied to the message, instead of signing the message itself.  This would produce an incorrect value when unblinded.  In RSA the same key should never be used for both encryption and signing purposes.
  • 12. REFERENCES  “Blind Signatures for Untraceable Payments,” D. Chaum, Advances in Cryptology Proceedings of Crypto 82, D. Chaum, R.L. Rivest, & A.T. Sherman (Eds.), Plenum, pp. 199-203.  RSA Laboratories - 7.3 What is a blind signature scheme?[Online]. Available: http://www.rsa.com/rsalabs/node.asp?id=2339  Blind signatures [Online]. Available: http://www.cs.bham.ac.uk/~mdr/teaching/modules06/ netsec/lectures/blind_sigs.html