In cryptography a blind signature, as introduced by David Chaum, is a form of digital signature .. “Blind signatures for untraceable payments” (PDF). Advances in. Chaum, D. () Blind Signatures for Untraceable Payments. In Chaum, D., Rivest R.L. and Sherman, A.T., Eds., Advances in Cryptology Proceedings of. Semantic Scholar extracted view of “Blind Signatures for Untraceable Payments” by David Chaum.

Author: Dull Mauzil
Country: Seychelles
Language: English (Spanish)
Genre: Sex
Published (Last): 6 December 2007
Pages: 495
PDF File Size: 16.5 Mb
ePub File Size: 19.87 Mb
ISBN: 527-3-59709-240-4
Downloads: 23234
Price: Free* [*Free Regsitration Required]
Uploader: Taukree

The author of the message computes the product of the message and blinding factor, i.

This is similar to the way zero-knowledge is defined in zero-knowledge proof systems. As an analogy, consider that Alice has a letter which should be blinv by an authority say Bobbut Alice does not want to reveal the content of the letter to Bob. Due to this multiplicative property of RSA, the same key should never be used for both encryption and signing purposes. In cryptography a blind signatureas introduced by David Chaum[1] is a form of digital signature in which the content of a message is disguised blinded before it is signed.

The blinded message is passed to a signer, who then signs it using a standard signing algorithm. The encrypted message would usually be some secret information which the attacker observed being sent encrypted under the signer’s public key which the attacker wants to learn more about.

Potential problems are analyzed and solutions offered. Blind signature schemes can be implemented using a number of common public key signing schemes, for instance RSA and DSA.

An unlinkable blind signature provides this guarantee, as the authority will not see the contents of any ballot it signs, and pamyents be unable to link the blinded ballots it signs back to the un-blinded ballots it receives for counting. An often-used analogy to the cryptographic blind signature is the physical act of a voter enclosing a completed anonymous ballot in a special carbon paper lined envelope that has the voter’s credentials pre-printed on the outside.


Advances in Cryptology Proceedings of Crypto.

Blind signature

One of the simplest blind signature schemes is ungraceable on RSA signing. We consider the development of Bitcoin and its sister currencies as an important disruptive financial innovation which is here to stay unless throttled by ill-considered legislative or regulatory actions. For example, the integrity of some electronic voting system may require that each ballot be certified by an election authority before it signatuges be accepted for counting; this allows the authority to check the credentials of the voter to ensure that they are allowed to vote, and that they are not submitting more than one ballot.

Are Disruptive Financial Innovations Here? When the attacker removes the blindness the signed version they will have the clear text:.

Modern EconomyVol. In each example, the message to be signed is contained in the value m.

Blind Signatures for Untraceable Payments

To perform such a signature, the message is first “blinded”, typically by combining cgaum in some way with a random “blinding factor”.

Digital currencies, virtual currencies, in-game currencies, etc. Bob will sign the outside of the carbon envelope without opening it and then send it back to Alice. This page was last edited on 17 Octoberat The overall assessment is that cryptocurrencies and variants of virtual currencies are a welcome development, they will offer competition to the existing modalities of money and governmental regulation, they will provide chakm means to economic agents for their transactions, and their innovative existence should be encouraged so that their beneficial features outperform any deleterious ones.

Blind signature – Wikipedia

This property sigatures not hold for the simple scheme described above: Simultaneously, it is important that this authority does not learn the voter’s selections.

The resulting blind signature can be publicly verified against the original, unblinded message in the manner of a regular digital signature. Blind signature schemes exist for many public key signing protocols. By using this site, you sighatures to the Terms of Use and Privacy Policy. In this case, the signer’s response is first “un-blinded” prior to verification in such a way that the signature remains valid for the un-blinded message.


Cryptocurrency has gained unprecedented attention since the birth of Bitcoin in Vitamin D and Bone Health. This includes various ” digital cash ” schemes and voting protocols. Thus, the signer does not view the message content, but a third party can later verify the signature and know that the signature pwyments valid within the limitations of the underlying signature scheme.

Views Read Edit View history.

The usual approach is to show that for every adversarial signer, there exists a simulator that can output the same information as the signer. She can place the letter blindd an envelope lined with carbon paper and send it to Bob. Bitcoin is an online paymentx of making and receiving payments in bitcoins. At the end of the protocol Alice obtains a signature on m without Bob learning anything about the message. New Materials for UV Biosensor. Some examples are provided below.

This attack works because in this blind signature scheme the signer signs the message directly.

Blind Signatures for Untraceable Payments | Satoshi Nakamoto Institute

Retrieved from ” https: In some blind signature schemes, such as RSA, it is even possible to remove the blinding factor from the signature before it is verified. Buffa, Stefania Corvaglia, Nazzarena Malavolta. This means one vote per signed ballot in elections, for example. The signing authority then calculates the blinded signature s’ as:.

American inventions Public-key cryptography Financial cryptography Electronic voting Digital signature schemes. Nutraceable contrast, in an unblinded signature scheme the signer would typically use a padding scheme e.

This intuition of not learning anything is hard to capture in glind terms. An official verifies the credentials and signs the envelope, thereby transferring his signature to the ballot inside via the carbon paper.