The Application of Blind Signature Based on RSA Algorithm

Article Preview

Abstract:

With the development of electronic commerce, the anonymity of the user on the consumption demand is increasingly outstanding. Electronic cash as a result of this demand arises. In an open network environment, how to protect the integrity, authenticity and integrity of electronic cash transaction has become the focus of current research. This paper mainly discusses electronic cash system based on blind signature. Using RSA blind signature guarantees the system's anonymity. It also analysis the system’s safety, and gives the solution method.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2290-2294

Citation:

Online since:

December 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Ziba Eslami and Mehdi Talebi: Electronic Commerce Research and Applications Vol. 10(2011), p.59.

Google Scholar

[2] Vijay Varadharajan, Khanh Quoc Nguyen and Yi Mu: Theoretical Computer Science Vol. 226(1999), p.173.

Google Scholar

[3] Xiaoya LIU and Xiaolong XIN: Computer Engineering and Applications Vol. 47(2011), p.114.

Google Scholar

[4] Yan Chilai: A study on digital signature and its applications to electronic voting and electronic cash Chaoyang University of Technology(2002), p.66.

Google Scholar

[5] SimplotRyl, Traore and Everaere: a survey International Journal of Parallel, Emergent and Distributed Systems Vol. 24(2009), p.243.

Google Scholar

[6] Xiaofeng Chen, Fangguo Zhang and Shengli Liu: The Journal of Systems and Software(2007), p.164.

Google Scholar

[7] Xiaoming Hu and Shangteng Huang: The Journal of Systems and Software(2008), p.1051.

Google Scholar

[8] Yong xiang BAI and Minning LI: Journal of Shaanxi University of Technology(Natural Science Edition) Vol. 25(2009), p.53.

Google Scholar

[9] Da Xing WANG and Ji kai TENG: Computer technology and development Vol. 19(2009), p.174.

Google Scholar

[10] Fan C I, Chen W K and Yeh Y S: Computer CommunicationVol. 23(2000), p.1677.

Google Scholar

[11] Chen Yiqun: sciences journal of harbin normal university Vol. 26(2010), p.45.

Google Scholar