Security of Proxy Blind Signature Scheme
نویسندگان
چکیده
منابع مشابه
Proxy Blind Signature Scheme
Blind signature is the concept to ensure anonymity of e-coins. Untracebility and unlinkability are two main properties of real coins, which require mimicking electronically. Whenever a user is permitted to spend an e-coin, he is in need to fulfill above requirements of blind signature. This paper proposes a proxy blind signature scheme with which a proxy is able to make proxy blind signature wh...
متن کاملProxy Blind Signature Scheme \ Revised
Blind signature is the concept to ensure anonymity of e-coins. Untracebility and unlinkability are two main properties of real coins, which require mimicking electronically. Whenever a user is permitted to spend an e-coin, he is in need to ful ll above requirements of blind signature. In this paper a proxy blind signature scheme is given with which a proxy is able to make proxy blind signature ...
متن کاملStamped Proxy Blind Signature Scheme
This paper presents two types of digital signature schemes combinely that are blind signature and proxy signature. In the proxy blind signature scheme, a signer other than the original signer signs the document as the agent of the original signer not knowing the meaning of the message. In this paper, an enhanced proxy blind signature is proposed, in which a time stamp approach is added to the p...
متن کاملOn the Security of Some Proxy Blind Signature Schemes
A proxy blind signature scheme is a digital signature scheme which combines the properties of proxy signature and blind signature schemes. Recently, Tan et al. proposed two proxy blind signature schemes based on DLP and ECDLP respectively. Later, compared with Tan et al.’s scheme, Lal and Awasthi further proposed a more efficient proxy blind signature scheme. In this paper, we show that Tan et ...
متن کاملSecurity Analysis of a Threshold Proxy Signature Scheme
The t-out-of-n threshold proxy signatures allow an original signer to delegate his signing capability to a group of proxy signers, and t or more proxy signers can generate valid signatures by cooperating. Recently, Liu and Huang proposed a variant of threshold proxy signature scheme in which all proxy signers remain anonymous. The authors claimed their construction satisfies unforgeability, pro...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information Technology Journal
سال: 2013
ISSN: 1812-5638
DOI: 10.3923/itj.2013.466.469