Implementation of RSA Blind Signature on CryptO-0N2 Protocol
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33090
Implementation of RSA Blind Signature on CryptO-0N2 Protocol

Authors: Esti Rahmawati Agustina, Is Esti Firmanesa

Abstract:

Blind Signature were introduced by Chaum. In this scheme, a signer can “sign” a document without knowing the document contain. This is particularly important in electronic voting. CryptO-0N2 is an electronic voting protocol which is development of CryptO-0N. During its development this protocol has not been furnished with the requirement of blind signature, so the choice of voters can be determined by counting center. In this paper will be presented of implementation of blind signature using RSA algorithm.

Keywords: Blind signature, electronic voting protocol, RSA algorithm.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1086937

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3189

References:


[1] Ari Juels, M.Luby and R. Ostrovsky, “Security of Blind Siganture (Extended Abstract),” in Burton S. Kaliski Jr., editor, Advanced in Cryptology – CRYPTO 97, vol. 1294 of Lecture Notes in Computer Science, Santa Barbara, CA, USA, August 17 – 21: Springer, Berlin, Germany, 1997, pp. 150 – 164.
[2] Rong-Jaye Chen, “Blind Signature and Their Application”, http://people.cs.nctu.edu.tw/~rjchen/Crypto2010/Blind_Signature.pdf last access 20 April 2013.
[3] E.R. Agustina, P.Y. Prakasa, CryptO-0N: Protocol Solution for Secure Ubiquitous e-Voting, CryptO-0N: Solusi Protokol untuk Secure Ubiquitous e-Voting (Translation Proceeding), Seminar Riset Teknologi Informasi (SRITI),2009.
[4] P.Y Prakasa, I. Budiarso, E.R. Agustina, Secure e-Election Application by Utilizing Cryptographic Function and Fingerprint Technology for Supporting e-Democracy, Aplikasi Secure e-Election dengan Memanfaatkan Fungsi Kriptografi dan Teknologi Fingerprint untuk Mendukung e-Democracy (Translation Proceeding), Seminar Nasional Informatika UPN Veteran Jogjakarta, 2009.
[5] P.Y Prakasa, Z. Suhardono, E.R Agustina, Logic Approach Analysis of CryptO-0N Protocol, Analisis Pendekatan Logic pada Protokol CryptO- 0N (Translation Journal),InfoKripto, 2012.
[6] E.R. Agustina, P.Y. Prakasa, B. Smith, “Analysis of CryptO-0N Protocol using Boyd and Mao Logic Approach,”2011, unpublished.
[7] P.Y. Prakasa, “Application Engineering Secure e-Voting with CryptO- 0N2 Protocol Implementation for Electronic Election, Rancang Bangun Aplikasi Secure e-Voting dengan Implementasi Protocol CryptO-0N2 untuk Pemilihan Umum Elektronis”, Tesis Magister Universitas Gunadarma, 2012.
[8] P.Y. Prakasa, E.R. Agustina, Security Optimization System Secure e- Voting for Supporting Electronic Election, Optimalisasi Keamanan Sistem Secure e-Voting untuk Mendukung Pemilihan Umum Elektronik (Translation Journal), Jurnal Sandi, 2012.
[9] P.Y. Prakasa, E.R. Agustina, KIOSK Electronic Voting with Certificate Digital Implementation for Supporting Electronic Election Security, KIOSK Electronic Voting dengan Implementasi Sertifikat Digital untuk Pengamanan Pemilihan Umum Elektronis, 2013, submitted for publication.
[10] A.J. Menezes, P.C van Oorschot, S.A Vanstone, Handbook of Applied Cryptography (Book Style), CRC Press. Boca Raton, 1997.