نتایج جستجو برای: blind signature

تعداد نتایج: 148016  

2007
Jan Camenisch Gregory Neven Abhi Shelat

We study an adaptive variant of oblivious transfer in which a sender has N messages, of which a receiver can adaptively choose to receive k one-after-the-other, in such a way that (a) the sender learns nothing about the receiver’s selections, and (b) the receiver only learns about the k requested messages. We propose two practical protocols for this primitive that achieve a stronger security no...

Journal: :IACR Cryptology ePrint Archive 2007
Dalia Khader

In real life, one requires signatures to be from people who fulfill certain criteria, implying that they should possess specific attributes. For example, Alice might want a signature from an employee in Bobs company who is a member in the IT staff, a senior manager within the biometrics team or at least a junior manager in the cryptography team. In such a case an Attribute Based Group Signature...

2014
Hermann de Meer Henrich Christopher Pöhls Joachim Posegga Kai Samelin

Malleable signature schemes (MSS) enable a third party to alter signed data in a controlled way, maintaining a valid signature after an authorized change. Most well studied cryptographic constructions are (1) redactable signatures (RSS), and (2) sanitizable signatures (SSS). RSSs allow the removal of blocks from a signed document, while SSSs allow changing blocks to arbitrary strings. We rigoro...

Journal: :J. Inf. Sci. Eng. 2006
Chih-Hung Wang

Designated confirmer signatures, initially introduced by Chaum in 1994, eliminated the undeniable signature shortcoming in which the signature can only be verified through the cooperation of the original signer. This paper proposes several practical constructions to multiple designated confirmer signature schemes. We employ the messagedependent proof of equality of the discrete logarithm and tr...

Journal: :IACR Cryptology ePrint Archive 2003
Hung-Min Sun Bin-Tsan Hsieh

Digital signature scheme is an important research topic in cryptography. An ordinary digital signature scheme allows a signer to create signatures of documents and the generated signatures can be verified by any person. A proxy signature scheme, a variation of ordinary digital signature scheme, enables a proxy signer to sign messages on behalf of the original signer. To be used in different app...

Journal: :Designs, Codes and Cryptography 2023

Abstract Blind signatures are a decades-old privacy enhancing technology. It is not always clearly understood that blind actually possess two separate properties: the intuitive understanding message to be signed hidden from signer, and fact resulting signature unlinkable (meaning signer cannot later tell in which session it created particular signature). The question is: how exactly should thes...

2005
Aggelos Kiayias Hong-Sheng Zhou

We present the first blind signature scheme that is efficient and provably secure without random oracles under concurrent attacks utilizing only two rounds of short communication. The scheme is based on elliptic curve groups for which a bilinear map exists and on extractable and equivocable commitments. The unforgeability of the employed signature scheme is guarranteed by the LRSW assumption wh...

Journal: :CoRR 2018
Engin Sahin Ihsan Yilmaz

In this study, the security of Novel Enhanced Quantum Representation (NEQR) of quantum images are suggested by using the Quantum Fourier Transform (QFT ) with blind trent. In the protocol, QFT and keys are used to share signature with recipients. So all members know only their signature information which are encrypted output of the QFT . This improves the security of the protocol. In addition, ...

2003
Chun-I Fan Ming-Te Chen

* This research is partially supported by the National Science Council, Taiwan, R.O.C., under grant NSC92-2213-E-110-035. Abstract Hwang, Lee, and Lai introduced a new blind signature scheme based on RSA cryptosystem. In this paper, their scheme is demonstrated as being insecure and an improved scheme against the attack is proposed. In addition, Hwang, Lee, and Lai’s comments on Fan’s blind sig...

Journal: :EURASIP J. Wireless Comm. and Networking 2006
Wai Yie Leong John Homer Danilo P. Mandic

A blind nonlinear interference cancellation receiver for code-division multiple-access(CDMA-) based communication systems operating over Rayleigh flat-fading channels is proposed. The receiver which assumes knowledge of the signature waveforms of all the users is implemented in an asynchronous CDMA environment. Unlike the conventional MMSE receiver, the proposed blind ICA multiuser detector is ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید