Results 1 to 10 of about 232,578 (158)

Post-Quantum Secure Identity-Based Proxy Blind Signature Scheme on a Lattice [PDF]

open access: yesEntropy, 2023
Blind signatures have been widely applied when privacy preserving is required, and the delegation of blind signature rights and a proxy blind signature (Proxy-BS) become necessary when the signer cannot sign.
Fengyin Li   +4 more
doaj   +2 more sources

A New Quantum Blind Signature Scheme with BB84-State [PDF]

open access: yesEntropy, 2019
The blind signature is widely used in cryptography applications because it can prevent the signer from gaining the original message. Owing to the unconditional security, the quantum blind signature is more advantageous than the classical one.
Feng-Lin Chen, Zhi-Hua Wang, Yong-Mo Hu
doaj   +2 more sources

Cryptanalysis of Lattice-Based Blind Signature and Blind Ring Signature Schemes [PDF]

open access: yesIEEE Access, 2021
A blind signature enables a user to obtain signatures on any message from an authority who cannot acquire any information on the message being signed. A blind ring signature scheme is designed as a ring signature scheme with the blindness property.
Kyung-Ah Shim, Youngjoo An
doaj   +2 more sources

Two Quantum Proxy Blind Signature Schemes Based on Controlled Quantum Teleportation [PDF]

open access: yesEntropy, 2022
We present a scheme for teleporting an unknown, two-particle entangled state with a message from a sender (Alice) to a receiver (Bob) via a six-particle entangled channel.
Qiming Luo   +3 more
doaj   +2 more sources

Lattice-based Blind Signatures [PDF]

open access: yes, 2009
Motivated by the need to have secure blind signatures even in the presence of quantum computers, we present two efficient blind signature schemes based on hard worst-case lattice problems.

core   +5 more sources

Blind Collective Signature Protocol [PDF]

open access: yesComputer Science Journal of Moldova, 2011
Using the digital signature (DS) scheme specified by Belarusian DS standard there are designed the collective and blind collective DS protocols. Signature formation is performed simultaneously by all of the assigned signers, therefore the proposed ...
Nikolay A. Moldovyan
doaj   +2 more sources

Two-Party Cooperative Blind Signature Scheme Based on SM9 [PDF]

open access: yesJisuanji gongcheng, 2023
In the existing SM9 blind signature scheme,the signature private key is leaked easily and the signature power is centralized,which are problematic.Hence,a two-party collaborative blind signature scheme based on SM9 is proposed.The Key Generation Center ...
CHEN Qianqian, QIN Baodong
doaj   +1 more source

Partial blind signature scheme based on SM9 algorithm

open access: yes网络与信息安全学报, 2021
Ordinary digital signatures have many deficiencies in effectively protecting users' privacy, and signature repudiation and tracking occur from time to time. In order to solve the above problems, a partial blind signature scheme based on the SM9 algorithm
LYU Yao   +2 more
doaj   +3 more sources

Secure E-Voting Protocol Based on SM9 Blind Signature and Ring Signature [PDF]

open access: yesJisuanji gongcheng, 2023
To solve the problems of anonymity,public verifiability,ballot collision,and forgery in the process of e-voting,an anonymous public verifiable e-voting system protocol design scheme is proposed based on SM9 algorithm.This scheme constructs an identity ...
RAO Jintao, CUI Zhe
doaj   +1 more source

Attribute-Based Blind Signature Scheme Based on Elliptic Curve Cryptography

open access: yesIEEE Access, 2022
Blind signature is a special digital signature that allows the signer to sign a document without knowing its content. However, in many situations, multiple people need to blindly sign messages.
Rui Ma, Linyue Du
doaj   +1 more source

Home - About - Disclaimer - Privacy