منابع مشابه
Digital Proxy Blind Signature Schemes Based on DLP and ECDLP
In a proxy signature scheme, a potential signer delegates his signing power to a proxy, who signs a message on behalf of the original signer. In a blind signature scheme, the signee cannot link the relationship between the blind message and the signature of the chosen message. That is, the signee cannot make a linkage between the blind signature and the identity of the requester. Therefore, it ...
متن کاملA New Proxy-Protected Signature Scheme Based on DLP
Received Sept 03 th , 2012 Accepted Sept 24 th , 2012 During electronic communication, proxy signature helps the signer to sign message on behalf of the original signer. This type of signature scheme is used when the signatory is not available to sign this document. In this paper, we propose a new protected proxy signature scheme. In the proposed scheme, the proxy signer can sign message on beh...
متن کاملSecured Proxy Blind Signature Scheme Based on Dlp with Minimum Computation Cost
Proxy blind signature is a combination 0f both the properties of proxy signature and blind signature scheme. This scheme is useful in many applications like e-voting, e-payment and mobile agent environments. This paper presents a new proxy blind signature scheme based on discrete logarithm problem(DLP), which satisfies the secure properties of both the blind signature scheme and the proxy signa...
متن کاملProxy Blind Signature Scheme
Blind signature is the concept to ensure anonymity of e-coins. Untracebility and unlinkability are two main properties of real coins, which require mimicking electronically. Whenever a user is permitted to spend an e-coin, he is in need to fulfill above requirements of blind signature. This paper proposes a proxy blind signature scheme with which a proxy is able to make proxy blind signature wh...
متن کاملProxy Blind Signature Scheme \ Revised
Blind signature is the concept to ensure anonymity of e-coins. Untracebility and unlinkability are two main properties of real coins, which require mimicking electronically. Whenever a user is permitted to spend an e-coin, he is in need to ful ll above requirements of blind signature. In this paper a proxy blind signature scheme is given with which a proxy is able to make proxy blind signature ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Computer Applications
سال: 2010
ISSN: 1001-9081
DOI: 10.3724/sp.j.1087.2010.02167