منابع مشابه
Stamped Proxy Blind Signature Scheme
This paper presents two types of digital signature schemes combinely that are blind signature and proxy signature. In the proxy blind signature scheme, a signer other than the original signer signs the document as the agent of the original signer not knowing the meaning of the message. In this paper, an enhanced proxy blind signature is proposed, in which a time stamp approach is added to the p...
متن کاملProxy Blind Signature Scheme
Blind signature is the concept to ensure anonymity of e-coins. Untracebility and unlinkability are two main properties of real coins, which require mimicking electronically. Whenever a user is permitted to spend an e-coin, he is in need to fulfill above requirements of blind signature. This paper proposes a proxy blind signature scheme with which a proxy is able to make proxy blind signature wh...
متن کاملProxy Blind Signature Scheme \ Revised
Blind signature is the concept to ensure anonymity of e-coins. Untracebility and unlinkability are two main properties of real coins, which require mimicking electronically. Whenever a user is permitted to spend an e-coin, he is in need to ful ll above requirements of blind signature. In this paper a proxy blind signature scheme is given with which a proxy is able to make proxy blind signature ...
متن کاملAn Application of time stamped proxy blind signature in e-voting
Voting is a way for a voter to make a decision or express an opinion or to choose a candidate. E-voting (Electronic Voting) refers to both the electronic means of casting a vote and the electronic means of counting and publishing that votes. The E voting system has some specific advantages as compared to the traditional voting system. In this paper, a secure and efficient e-voting protocol is p...
متن کاملA Proxy Blind Signature Scheme over Braid Groups
A proxy blind signature scheme is the combination of proxy signature and blind signature scheme. In 2009,Verma proposed a proxy blind signature scheme over braid groups. Verma claimed that the proposed scheme is secure against all possible security lapses and also satisfy all essential security attributes.This paper analyzes Verma’s proposed scheme and found that this scheme suffers with the se...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2013
ISSN: 0975-8887
DOI: 10.5120/10713-5690