[[abstract]]With the help of a blind signature scheme, a requester can obtain a signature on a message from a signer such that the signer knows nothing about the content of the messages and is unable to link the resulting message-signature pair; namely, a blind signature scheme can achieve both blindness and untraceability. Due to the above properties, the blind signature scheme can be used in cryptographic applications such as electronic voting systems and cash payment systems. So far, most of the proposed blind signature schemes are based on the difficulty of solving the factoring problem and quadratic residues. In this paper, the authors intend to propose two new untraceable blind signature schemes based on the difficulty of solving the ...
With the rapid development of modern technology, personal privacy has become a critical concern in m...
Recently, many existing partially blind signature scheme based on a single hard problem such as fact...
A proxy blind signature scheme is combination of two signature schemes particularly proxy signature ...
[[abstract]]With the help of a blind signature scheme, a requester can obtain a signature on a messa...
With the help of a blind signature scheme, a requester can obtain a signature on a message from a si...
[[abstract]]How to design a blind signature based on the discrete logarithm for untraceability is st...
[[abstract]]How to design a blind signature based on the discrete logarithm for untraceability is st...
One of the important objectives of information security systems is providing authentication of the e...
A blind signature scheme allows a user to obtain a signa-ture on a given message without revealing a...
Recently, four classed of blind signature schemes have been introduced: the hidden, the weak blind,...
Blind Signature is an addendum of Digital Signature.It is a two party protocol,in which a requester ...
In recent years, Elliptic Curve Cryptography (ECC) has attracted the attention of researchers due to...
In recent years, Elliptic Curve Cryptography (ECC) has attracted the attention of researchers due to...
Blind signature allows a requester to obtain signature from a signer on any document in such a way t...
[[abstract]]In this paper, the authors intend to propose a new untraceable blind signature scheme ba...
With the rapid development of modern technology, personal privacy has become a critical concern in m...
Recently, many existing partially blind signature scheme based on a single hard problem such as fact...
A proxy blind signature scheme is combination of two signature schemes particularly proxy signature ...
[[abstract]]With the help of a blind signature scheme, a requester can obtain a signature on a messa...
With the help of a blind signature scheme, a requester can obtain a signature on a message from a si...
[[abstract]]How to design a blind signature based on the discrete logarithm for untraceability is st...
[[abstract]]How to design a blind signature based on the discrete logarithm for untraceability is st...
One of the important objectives of information security systems is providing authentication of the e...
A blind signature scheme allows a user to obtain a signa-ture on a given message without revealing a...
Recently, four classed of blind signature schemes have been introduced: the hidden, the weak blind,...
Blind Signature is an addendum of Digital Signature.It is a two party protocol,in which a requester ...
In recent years, Elliptic Curve Cryptography (ECC) has attracted the attention of researchers due to...
In recent years, Elliptic Curve Cryptography (ECC) has attracted the attention of researchers due to...
Blind signature allows a requester to obtain signature from a signer on any document in such a way t...
[[abstract]]In this paper, the authors intend to propose a new untraceable blind signature scheme ba...
With the rapid development of modern technology, personal privacy has become a critical concern in m...
Recently, many existing partially blind signature scheme based on a single hard problem such as fact...
A proxy blind signature scheme is combination of two signature schemes particularly proxy signature ...