In this paper, we present new blind signature schemes based on the factorization problem. They are the first blind signature schemes proved secure relatively to factorization. By security, we mean that no "one-more forgery" is possible even under a parallel attack. In other terms, a user that receives k electronic coins cannot manufacture k + 1. Those security definitions have been introduced by Pointcheval and Stern [18] for use in electronic cash. In fact, blind signatures were defined with this aim and it is still their most important application, together with anonymous voting. In the following, we will present an efficient reduction of an attack to a factorization algorithm in the random oracle model [1]
Abstract—This manuscript presents a fast blind signature scheme with extremely low computation for u...
Abstract. Group signature and blind signature are very important primitives in cryptography. A group...
Known constructions of blind signature schemes suffer from at least one of the following limitations...
Existing blind signature schemes that are secure for poly- nomially many concurrent executions of th...
At Crypto’99, Dr Coron, Naccache, and Stern presented a signature forgery strategy of the RSA digita...
[[abstract]]With the help of a blind signature scheme, a requester can obtain a signature on a messa...
[[abstract]]With the help of a blind signature scheme, a requester can obtain a signature on a messa...
Recently, many existing partially blind signature scheme based on a single hard problem such as fact...
Blind signature schemes provide the functionality of a carbon copy envelope: The user (receiver) put...
Blind signature schemes provide the functionality of a carbon copy envelope: The user (receiver) put...
Blind signatures have proved an essential building block for applications that protect privacy while...
With the help of a blind signature scheme, a requester can obtain a signature on a message from a si...
[[abstract]]In this paper, the authors intend to propose a new untraceable blind signature scheme ba...
One of the important objectives of information security systems is providing authentication of the e...
A blind signature scheme allows a user to obtain a signa-ture on a given message without revealing a...
Abstract—This manuscript presents a fast blind signature scheme with extremely low computation for u...
Abstract. Group signature and blind signature are very important primitives in cryptography. A group...
Known constructions of blind signature schemes suffer from at least one of the following limitations...
Existing blind signature schemes that are secure for poly- nomially many concurrent executions of th...
At Crypto’99, Dr Coron, Naccache, and Stern presented a signature forgery strategy of the RSA digita...
[[abstract]]With the help of a blind signature scheme, a requester can obtain a signature on a messa...
[[abstract]]With the help of a blind signature scheme, a requester can obtain a signature on a messa...
Recently, many existing partially blind signature scheme based on a single hard problem such as fact...
Blind signature schemes provide the functionality of a carbon copy envelope: The user (receiver) put...
Blind signature schemes provide the functionality of a carbon copy envelope: The user (receiver) put...
Blind signatures have proved an essential building block for applications that protect privacy while...
With the help of a blind signature scheme, a requester can obtain a signature on a message from a si...
[[abstract]]In this paper, the authors intend to propose a new untraceable blind signature scheme ba...
One of the important objectives of information security systems is providing authentication of the e...
A blind signature scheme allows a user to obtain a signa-ture on a given message without revealing a...
Abstract—This manuscript presents a fast blind signature scheme with extremely low computation for u...
Abstract. Group signature and blind signature are very important primitives in cryptography. A group...
Known constructions of blind signature schemes suffer from at least one of the following limitations...