Implementation of RSA Blind Signature on CryptO-0N2 Protocol
Authors: Esti Rahmawati Agustina, Is Esti Firmanesa
Abstract:
Blind Signature were introduced by Chaum. In this scheme, a signer can “sign” a document without knowing the document contain. This is particularly important in electronic voting. CryptO-0N2 is an electronic voting protocol which is development of CryptO-0N. During its development this protocol has not been furnished with the requirement of blind signature, so the choice of voters can be determined by counting center. In this paper will be presented of implementation of blind signature using RSA algorithm.
Keywords: Blind signature, electronic voting protocol, RSA algorithm.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1086937
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3192References:
[1] Ari Juels, M.Luby and R. Ostrovsky, “Security of Blind Siganture
(Extended Abstract),” in Burton S. Kaliski Jr., editor, Advanced in
Cryptology – CRYPTO 97, vol. 1294 of Lecture Notes in Computer
Science, Santa Barbara, CA, USA, August 17 – 21: Springer, Berlin,
Germany, 1997, pp. 150 – 164.
[2] Rong-Jaye Chen, “Blind Signature and Their Application”,
http://people.cs.nctu.edu.tw/~rjchen/Crypto2010/Blind_Signature.pdf
last access 20 April 2013.
[3] E.R. Agustina, P.Y. Prakasa, CryptO-0N: Protocol Solution for Secure
Ubiquitous e-Voting, CryptO-0N: Solusi Protokol untuk Secure
Ubiquitous e-Voting (Translation Proceeding), Seminar Riset Teknologi
Informasi (SRITI),2009.
[4] P.Y Prakasa, I. Budiarso, E.R. Agustina, Secure e-Election Application
by Utilizing Cryptographic Function and Fingerprint Technology for
Supporting e-Democracy, Aplikasi Secure e-Election dengan
Memanfaatkan Fungsi Kriptografi dan Teknologi Fingerprint untuk
Mendukung e-Democracy (Translation Proceeding), Seminar Nasional
Informatika UPN Veteran Jogjakarta, 2009.
[5] P.Y Prakasa, Z. Suhardono, E.R Agustina, Logic Approach Analysis of
CryptO-0N Protocol, Analisis Pendekatan Logic pada Protokol CryptO-
0N (Translation Journal),InfoKripto, 2012.
[6] E.R. Agustina, P.Y. Prakasa, B. Smith, “Analysis of CryptO-0N Protocol
using Boyd and Mao Logic Approach,”2011, unpublished.
[7] P.Y. Prakasa, “Application Engineering Secure e-Voting with CryptO-
0N2 Protocol Implementation for Electronic Election, Rancang Bangun
Aplikasi Secure e-Voting dengan Implementasi Protocol CryptO-0N2
untuk Pemilihan Umum Elektronis”, Tesis Magister Universitas
Gunadarma, 2012.
[8] P.Y. Prakasa, E.R. Agustina, Security Optimization System Secure e-
Voting for Supporting Electronic Election, Optimalisasi Keamanan
Sistem Secure e-Voting untuk Mendukung Pemilihan Umum Elektronik
(Translation Journal), Jurnal Sandi, 2012.
[9] P.Y. Prakasa, E.R. Agustina, KIOSK Electronic Voting with Certificate
Digital Implementation for Supporting Electronic Election Security,
KIOSK Electronic Voting dengan Implementasi Sertifikat Digital untuk
Pengamanan Pemilihan Umum Elektronis, 2013, submitted for
publication.
[10] A.J. Menezes, P.C van Oorschot, S.A Vanstone, Handbook of Applied
Cryptography (Book Style), CRC Press. Boca Raton, 1997.