Abstract. Threshold and Blindness are two important properties in cryptography system. They can provide security and privacy. In this paper, We present an efficient construction from Bilin-ear pairing in an ID-based cryptography system. In an ID-based (k, n) threshold blind signature scheme, Private Key Generation Center(PKGC) distributes the secret key to n group members. The user only communicates with the dealer who has collected no less than k valid sub-signatures and computes the group signature. During this process, the signer and the dealer have no infor-mation about the message(blindness). We analyze and prove the security of our scheme. To the best of the author’s knowledge, this is the first ID-based threshold blind signature sche...
The focus of this paper is to design an efficient and secure solution addressing the key escrow pro...
Abstract—In this paper, a (t; n) threshold signature scheme is constructed without a trusted party, ...
Since the introduction of Identity-based (ID-based) cryptography by Shamir in 1984, numerous ID-base...
A blind signature scheme is a protocol for obtaining a digital signature from a signer, but the sign...
This paper presents two Identity-Based Blind Signature (IBBS) schemes based on bilinear pairings. Bo...
Abstract—This paper presents two Identity-Based Blind Signature (IBBS) schemes based on bilinear pai...
In 2010, Rao et al. proposed an identity-based blind signature scheme based on bilinear pairings. Th...
Abstract. ID-based public key systems allow the user to use his/her identity as the public key, whic...
[[abstract]]A partially blind signature is a variant of the blind signature. The partially blind sig...
Blind signature schemes provide the feature that a user is able to get a signature without giving th...
In this paper we apply techniques from secret sharing and threshold decryption to show how to proper...
In this paper we apply techniques from secret sharing and threshold decryption to show how to proper...
In this paper we apply techniques from secret sharing and threshold decryption to show how to proper...
In this paper we apply techniques from secret sharing and threshold decryption to show how to proper...
Blind signature allows a user to obtain a signature on a message without revealing anything about th...
The focus of this paper is to design an efficient and secure solution addressing the key escrow pro...
Abstract—In this paper, a (t; n) threshold signature scheme is constructed without a trusted party, ...
Since the introduction of Identity-based (ID-based) cryptography by Shamir in 1984, numerous ID-base...
A blind signature scheme is a protocol for obtaining a digital signature from a signer, but the sign...
This paper presents two Identity-Based Blind Signature (IBBS) schemes based on bilinear pairings. Bo...
Abstract—This paper presents two Identity-Based Blind Signature (IBBS) schemes based on bilinear pai...
In 2010, Rao et al. proposed an identity-based blind signature scheme based on bilinear pairings. Th...
Abstract. ID-based public key systems allow the user to use his/her identity as the public key, whic...
[[abstract]]A partially blind signature is a variant of the blind signature. The partially blind sig...
Blind signature schemes provide the feature that a user is able to get a signature without giving th...
In this paper we apply techniques from secret sharing and threshold decryption to show how to proper...
In this paper we apply techniques from secret sharing and threshold decryption to show how to proper...
In this paper we apply techniques from secret sharing and threshold decryption to show how to proper...
In this paper we apply techniques from secret sharing and threshold decryption to show how to proper...
Blind signature allows a user to obtain a signature on a message without revealing anything about th...
The focus of this paper is to design an efficient and secure solution addressing the key escrow pro...
Abstract—In this paper, a (t; n) threshold signature scheme is constructed without a trusted party, ...
Since the introduction of Identity-based (ID-based) cryptography by Shamir in 1984, numerous ID-base...