The Application of Blind Signature Based on RSA Algorithm

被引:0
作者
Duo, Chunhong [1 ]
Yue, Yan [1 ]
Yuan, Chengpeng [2 ]
机构
[1] North China Elect Power Univ, Dept Comp, Baoding, Peoples R China
[2] Datang Qingyuan Cogenerat Power Co Ltd, Baoding, Peoples R China
来源
INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS, PTS 1-4 | 2013年 / 241-244卷
关键词
Blind signature; RSA; Security; Electronic cash;
D O I
10.4028/www.scientific.net/AMM.241-244.2290
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of electronic commerce, the anonymity of the user on the consumption demand is increasingly outstanding. Electronic cash as a result of this demand arises. In an open network environment, how to protect the integrity, authenticity and integrity of electronic cash transaction has become the focus of current research. This paper mainly discusses electronic cash system based on blind signature. Using RSA blind signature guarantees the system's anonymity. It also analysis the system's safety, and gives the solution method.
引用
收藏
页码:2290 / +
页数:2
相关论文
共 11 条
[1]  
Bai Yongxiang, 2009, J SHAANXI U TECHNOLO, V25, P53
[2]   ID-based restrictive partially blind signatures and applications [J].
Chen, Xiaofeng ;
Zhang, Fangguo ;
Liu, Shengli .
JOURNAL OF SYSTEMS AND SOFTWARE, 2007, 80 (02) :164-171
[3]  
Chen Yiqun, 2010, SCI J HARBIN NORMAL, V26, P45
[4]   A new untraceable off-line electronic cash system [J].
Eslami, Ziba ;
Talebi, Mehdi .
ELECTRONIC COMMERCE RESEARCH AND APPLICATIONS, 2011, 10 (01) :59-66
[5]   Randomization enhanced Chaum's blind signature scheme [J].
Fan, CI ;
Chen, WK ;
Yeh, YS .
COMPUTER COMMUNICATIONS, 2000, 23 (17) :1677-1680
[6]  
Hu Xiaoming, 2008, J SYST SOFTWARE, P1051
[7]  
Liu Xiaoya, 2011, Computer Engineering and Applications, V47, P114, DOI 10.3778/j.issn.1002-8331.2011.04.031
[8]  
Ryl Simplot, 2009, INT J PARALLEL EMERG, V24, P243
[9]   On the design of efficient RSA-based off-line electronic cash schemes [J].
Varadharajan, V ;
Nguyen, KQ ;
Mu, Y .
THEORETICAL COMPUTER SCIENCE, 1999, 226 (1-2) :173-184
[10]  
WANG Da Xing, 2009, COMPUTER TECHNOLOGY, V19, P174