نتایج جستجو برای: blind signature

تعداد نتایج: 148016  

Journal: :IACR Cryptology ePrint Archive 2002
Fangguo Zhang Kwangjo Kim

Group signature and blind signature are very important primitives in cryptography. A group signature scheme allows a group member to sign messages anonymously on behalf of the group and a blind signature scheme can ensure anonymity of the sender of a message. Recently, S. Xia and J. You [14] proposed a group signature scheme with strong separability in which the revocation manager can work with...

Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's privacy and prevent double voting. After that, several schemes have been presented to fulfill these properties. However, many of them suffer from the same weaknesses. In this p...

Journal: :CoRR 2004
Amit K. Awasthi Sunder Lal

The concept of ring signature was introduced by Rivest, Shamir and Tauman. This signature is considered to be a simplified group signature from which identity of signer is ambiguous although verifier knows the group to which signer belong. In this paper we introduce a new proxy ring signature scheme.

1996
David Pointcheval Jacques Stern

In this paper, we give a provably secure design for blind signatures, the most important ingredient for anonymity in off-line electronic cash systems. Previous examples of blind signature schemes were constructed from traditional signature schemes with only the additional proof of blindness. The design of some of the underlying signature schemes can be validated by a proof in the so-called rand...

2007
Toktam Taghavi Abbas Ghaemi Bafghi Mohsen Kahani

Many e-voting schemes have been proposed in the literature. However, none of them is both secure and practical. In this paper, a practical and secure electronic voting protocol for large-scale voting over the Internet is investigated. Blind signature is applied to a voter's ballot making it impossible for anyone to trace the ballot back to the voter. Unlike previous blind signature based scheme...

Journal: :Computers & Electrical Engineering 2011
Debiao He Jianhua Chen Rui Zhang

The blind signature schemes are useful in some applications where the anonymity is a big issue. Examples include the online voting systems and the electronic cash systems. Since the first identity-based blind signature scheme was proposed by Zhang et al., many identity-based blind signature schemes using bilinear pairings have been proposed. But the relative computation cost of the pairing is a...

Journal: :IJMOR 2016
Nedal Tahat Emad Eddien Abdallah

Partially blind signature is cryptographic system that is used in several protocols including e-cash and e-commerce systems. In proxy partially blind signature, part of the message is approved by the signer and the signature supplicant. Elliptic curve discrete logarithmic (ECDL) is an extremely difficult to solve problem as compared to any standard inverse operation of a one-way-trap door funct...

1994
Patrick Horster Markus Michels Holger Petersen

There have been several approaches in the past to obtain signature schemes with appendix and signature schemes giving message recovery based on the discrete logarithm problem. Most of them can be embedded into a Meta-ElGamal and Meta-Message recovery scheme. In this paper we present the Meta-blind signature schemes which have been developed from the ElGamal based blind signature scheme and the ...

2003
Fangguo Zhang Kwangjo Kim

Blind signature and proxy signature are very important technologies in secure e-commerce. Identity-based (simply ID-based) public key cryptosystem can be a good alternative for certificate-based public key setting, especially when efficient key management and moderate security are required. In this paper, we propose a new ID-based blind signature scheme and an ID-based partial delegation proxy ...

Journal: :Int. Arab J. Inf. Technol. 2017
Minh Hieu Hai Nam Nikolay A. Moldovyan Giang Tien

Blind signature and blind multisignature schemes are useful in protocols that guarantee the anonymity of the participants. In practice, in some cases the electronic messages are to be signed by several signers and an electronic message is first blinded then passed to each of the signers, who then sign it using some special signature scheme such as collective signature protocol. In this paper, w...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید