Results 1 to 10 of about 232,578 (158)
Post-Quantum Secure Identity-Based Proxy Blind Signature Scheme on a Lattice [PDF]
Blind signatures have been widely applied when privacy preserving is required, and the delegation of blind signature rights and a proxy blind signature (Proxy-BS) become necessary when the signer cannot sign.
Fengyin Li +4 more
doaj +2 more sources
A New Quantum Blind Signature Scheme with BB84-State [PDF]
The blind signature is widely used in cryptography applications because it can prevent the signer from gaining the original message. Owing to the unconditional security, the quantum blind signature is more advantageous than the classical one.
Feng-Lin Chen, Zhi-Hua Wang, Yong-Mo Hu
doaj +2 more sources
Cryptanalysis of Lattice-Based Blind Signature and Blind Ring Signature Schemes [PDF]
A blind signature enables a user to obtain signatures on any message from an authority who cannot acquire any information on the message being signed. A blind ring signature scheme is designed as a ring signature scheme with the blindness property.
Kyung-Ah Shim, Youngjoo An
doaj +2 more sources
Two Quantum Proxy Blind Signature Schemes Based on Controlled Quantum Teleportation [PDF]
We present a scheme for teleporting an unknown, two-particle entangled state with a message from a sender (Alice) to a receiver (Bob) via a six-particle entangled channel.
Qiming Luo +3 more
doaj +2 more sources
Lattice-based Blind Signatures [PDF]
Motivated by the need to have secure blind signatures even in the presence of quantum computers, we present two efficient blind signature schemes based on hard worst-case lattice problems.
core +5 more sources
Blind Collective Signature Protocol [PDF]
Using the digital signature (DS) scheme specified by Belarusian DS standard there are designed the collective and blind collective DS protocols. Signature formation is performed simultaneously by all of the assigned signers, therefore the proposed ...
Nikolay A. Moldovyan
doaj +2 more sources
Two-Party Cooperative Blind Signature Scheme Based on SM9 [PDF]
In the existing SM9 blind signature scheme,the signature private key is leaked easily and the signature power is centralized,which are problematic.Hence,a two-party collaborative blind signature scheme based on SM9 is proposed.The Key Generation Center ...
CHEN Qianqian, QIN Baodong
doaj +1 more source
Partial blind signature scheme based on SM9 algorithm
Ordinary digital signatures have many deficiencies in effectively protecting users' privacy, and signature repudiation and tracking occur from time to time. In order to solve the above problems, a partial blind signature scheme based on the SM9 algorithm
LYU Yao +2 more
doaj +3 more sources
Secure E-Voting Protocol Based on SM9 Blind Signature and Ring Signature [PDF]
To solve the problems of anonymity,public verifiability,ballot collision,and forgery in the process of e-voting,an anonymous public verifiable e-voting system protocol design scheme is proposed based on SM9 algorithm.This scheme constructs an identity ...
RAO Jintao, CUI Zhe
doaj +1 more source
Attribute-Based Blind Signature Scheme Based on Elliptic Curve Cryptography
Blind signature is a special digital signature that allows the signer to sign a document without knowing its content. However, in many situations, multiple people need to blindly sign messages.
Rui Ma, Linyue Du
doaj +1 more source

