Results 11 to 20 of about 232,677 (257)
Identity-Based Partially Blind Signature Scheme: Cryptanalysis and Construction
Blind signature is a special type of digital signature, the signer cannot see the specific content signed. However, blindness may cause users to abuse their rights.
Yuhong Jiang, Lunzhi Deng, Bingqin Ning
doaj +1 more source
Attribute-based blind signature is used to realize the blind signature of messages by multiple people, and it is suitable for electronic payment services in the cloud.
Rui Ma, Linyue Du
doaj +1 more source
Security of Blind Signatures Revisited [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Schröder, Dominique, Unruh, Dominique
openaire +3 more sources
A probabilistic method for blind multiuser detection using array observations [PDF]
In this paper, a blind algorithm for detecting active users in a DS-CDMA system is presented. This probabilistic algorithm relies on the theory of hidden Markov models (HMM) and is completely blind in the sense that no knowledge of the signature ...
Antón Haro, Carles +2 more
core +1 more source
Two-party cooperative blind signature based on SM2
SM2, issued by China in 2010, is a public key cryptography standard based on elliptic curves.It has been widely used in finance, social security and other fields thanks to its advantages of improved signature efficiency, decreased storage space and ...
Xue BAI +3 more
doaj +3 more sources
Cryptanalysis of ID based Proxy-Blind signature scheme over lattice
In this article we review the ID Based Proxy-Blind signature scheme proposed by Zhang et al. and we give an attack on the scheme revealing the master secret key used in the construction of their scheme.
Swati Rawal, Sahadeo Padhye
doaj +1 more source
A New Post-Quantum Blind Signature From Lattice Assumptions
At present, several post-quantum cryptosystems have been proposed, and lattice-based cryptography is the main candidate. Especially in the direction of digital signatures, there are now many practical lattice-based signature schemes. However, there exist
Pingyuan Zhang +4 more
doaj +1 more source
Blind multiuser detection using hidden markov models theory [PDF]
We present an adaptive algorithm based on the theory of hidden Markov models (HMM) which is capable of jointly detecting the users in a DS-CDMA system.
Antón Haro, Carles +2 more
core +1 more source
A Blind Digital Signature Protocol over NTRU [PDF]
Actually, the NIST post-quantum cryptosystem standardization competition reached its third round with seven finalist candidates. And NIST invites the cryptographic community to analyzing the selected candidates. In this context, we contribute by creating
Laaji El Hassane, Azizi Abdelmalek
doaj +1 more source
Blind multiuser deconvolution in fading and dispersive channels [PDF]
An adaptive near-far resistant technique for the blind joint multiuser identification and detection in asynchronous CDMA systems is analyzed in fading and dispersive GSM channels.Peer ReviewedPostprint (published ...
Rodríguez Fonollosa, Javier +3 more
core +1 more source

