Blind electronic signature mechanisms on elliptic curves improvement.
Abstract
The work is devoted to consideration the blind electronic signature mechanisms based on algorithms, described in ISO/IEC 14888-3:2006 and national standard DSTU 4145-2002. It is tested protocol security based on these algorithms by the anonymity criterion. It is proved, that the considered protocol is protected by the anonymity criterion, that is impossible to identify the author of the signed document.
Downloads
References
Information technology – Security techniques – Digital signatures with appendix. Part 3. Discrete logarithm based mechanisms: ISO/IEC 14888-3. - (Edition 2 (2006-11-15)): 2006. – 68 p.
Information technology – Security techniques – Blind digital signatures. Part 2. Discrete logarithm based mechanisms: ISO/IEC DIS 18370-2:2014(E):2015. – 70 p.
Gorbenko I.D. Applied cryptology. Theory. Practice. Application: monograph. / I.D. Gorbenko, U.I. Gorbenko. - Kh.: Fort, 2012. - 870 p.
Information technology – Security techniques – Digital signature based on elliptic curves – Generation and verification: DSTU 4145-2002. – K.: State Standard of Ukraine, 2003. – 35 p. – (National standards of Ukraine).
Yesina M.V. Blind digital signature protocol on elliptic curves based on international standard ISO/IEC 14888-3:2006 (EC DSA) and national standard DSTU 4145-2002 / M. V. Yesina // Theoretical and applied aspect of program systems development (TAAPSD’15): 12th International Conference Proceeding, 23-26 November 2015 – K.: National University of «Kyiv-Mohyla Academy», 2015. – P.65–69.
Yesina M.V. Mathematical model of a protocol of electronic signature based on elliptic curves / M.V. Yesina // Applied Radio-electronics. – Kh.: Kharkiv National University of Radio Electronics, 2015. – Vol. 14. - № 4. – P.300–305.
Nikulishchev H.I. Blind digital signature protocol on elliptic curves over vector finite field / H.I. Nikulishchev // Radioelectron-ics, informatics, management. – 2013. – № 2. – P.71–76.
Nikulishchev H.I. Anonymity as a criterion of evaluation blind digital signature protocols security / H.I. Nikulishchev, G.L. Kozina // The legal, regulatory and metrological support of information security in Ukraine. – 2012. – № 2. – P.59–65.