Share
Explore BrainMass

Information Systems Security & Cryptography

1. For each of the following concepts, research the internet for information on the topic and
provide an explanation as to: (a) what the concept means, (b)
how is it realized mathematically, and (c) what are its practical benefits. Identify the
source(s) for your information.

i. Blind signatures
ii. Identity-based encryption
iii. Threshold cryptography
iv. Key escrow
v. Side channel analysis

Guideline: Your answer should clearly explain the concept along the three aspects identified above to any of your classmates who did not undertake this exercise themselves.

Attachments

Solution Preview

1. For each of the following concepts, research the internet for information on the topic and provide a 1/2 page to one page brief essay explaining: (a) what the concept means, (b) how is it realized mathematically, and (c) what are its practical benefits. Identify the source(s) for your information.
i. Blind signatures
ii. Identity-based encryption
iii. Threshold cryptography
iv. Key escrow
v. Side channel analysis
Guideline: Your answer should clearly explain the concept along the three aspects identified above to any of your classmates who did not undertake this exercise themselves.

Blind Signatures

From Wikipedia:

In cryptography, a blind signature, as introduced by David Chaum [1], is a form of digital signature in which the content of a message is disguised (blinded) before it is signed. The resulting blind signature can be publicly verified against the original, unblinded message in the manner of a regular digital signature. Blind signatures are typically employed in privacy-related protocols where the signer and message author are different parties. Examples include cryptographic election systems and digital cash schemes.

An often-used analogy to the cryptographic blind signature is the physical act of enclosing a message in an envelope, which is then sealed and signed by a signing agent. Thus, the signer does not view the message content, but a third party can later verify the signature and know that the signature is valid within the limitations of the underlying signature scheme.

Blind signatures can also be used to provide unlinkability, which prevents the signer from linking the blinded message it signs to a later un-blinded version that it may be called upon to verify. In this case, the signer's response is first "un-blinded" prior ...

Solution Summary

Discussion and explanation of numerous cryptography questions.

$2.19