[[abstract]]In this paper, the authors intend to propose a new untraceable blind signature scheme based on the RSA cryptosystem. This paper applies the Extended Euclidean algorithm to our blind signature scheme. Compared with other blind signature schemes, our proposed scheme can meet the all requirements of a blind signature scheme. The security of the proposed scheme, as did that of the RSA cryptosystem, depends on the difficulty of solving the factoring problem
International audienceIn this paper we give the first blind signature protocol for code-based crypto...
International audienceIn this paper we give the first blind signature protocol for code-based crypto...
International audienceIn this paper we give the first blind signature protocol for code-based crypto...
[[abstract]]With the help of a blind signature scheme, a requester can obtain a signature on a messa...
[[abstract]]With the help of a blind signature scheme, a requester can obtain a signature on a messa...
In 2003, Hwang et al. proposed a new blind signature based on the RSA cryptosystem. The Extended Euc...
With the help of a blind signature scheme, a requester can obtain a signature on a message from a si...
Blind signature schemes, as important cryptographic primitives, are useful protocols that guarantee ...
Existing blind signature schemes that are secure for poly- nomially many concurrent executions of th...
One of the important objectives of information security systems is providing authentication of the e...
Abstract—A blind signature is a very important technology in e-commerce. This paper uses an ideal ci...
In this paper, we present new blind signature schemes based on the factorization problem. They are t...
A blind signature enables a user to obtain signatures on any message from an authority who cannot ac...
International audienceIn this paper we give the first blind signature protocol for code-based crypto...
[[abstract]]Chen et al. proposed a new Rabin-like blind signature scheme, which is based on the squa...
International audienceIn this paper we give the first blind signature protocol for code-based crypto...
International audienceIn this paper we give the first blind signature protocol for code-based crypto...
International audienceIn this paper we give the first blind signature protocol for code-based crypto...
[[abstract]]With the help of a blind signature scheme, a requester can obtain a signature on a messa...
[[abstract]]With the help of a blind signature scheme, a requester can obtain a signature on a messa...
In 2003, Hwang et al. proposed a new blind signature based on the RSA cryptosystem. The Extended Euc...
With the help of a blind signature scheme, a requester can obtain a signature on a message from a si...
Blind signature schemes, as important cryptographic primitives, are useful protocols that guarantee ...
Existing blind signature schemes that are secure for poly- nomially many concurrent executions of th...
One of the important objectives of information security systems is providing authentication of the e...
Abstract—A blind signature is a very important technology in e-commerce. This paper uses an ideal ci...
In this paper, we present new blind signature schemes based on the factorization problem. They are t...
A blind signature enables a user to obtain signatures on any message from an authority who cannot ac...
International audienceIn this paper we give the first blind signature protocol for code-based crypto...
[[abstract]]Chen et al. proposed a new Rabin-like blind signature scheme, which is based on the squa...
International audienceIn this paper we give the first blind signature protocol for code-based crypto...
International audienceIn this paper we give the first blind signature protocol for code-based crypto...
International audienceIn this paper we give the first blind signature protocol for code-based crypto...