Results 1 to 10 of about 122,299 (291)

Lattice-based Blind Signatures [PDF]

open access: yes, 2009
Motivated by the need to have secure blind signatures even in the presence of quantum computers, we present two efficient blind signature schemes based on hard worst-case lattice problems.

core   +5 more sources

Cryptanalysis of Lattice-Based Blind Signature and Blind Ring Signature Schemes [PDF]

open access: yesIEEE Access, 2021
A blind signature enables a user to obtain signatures on any message from an authority who cannot acquire any information on the message being signed. A blind ring signature scheme is designed as a ring signature scheme with the blindness property.
Kyung-Ah Shim, Youngjoo An
doaj   +2 more sources

The Asperian Design [PDF]

open access: yesSpirituality Studies, 2017
Reality is two-fold, composed of the lighted world as revealed in Genesis, and the darker primordiality which preceded it. The illuminated represents that which the human mind can comprehend, manipulate and re-order to its will: a “designed” and ...
Thomas Crowther
doaj   +3 more sources

Vibration-Based Diagnostics of Rolling Element Bearings Using the Independent Component Analysis (ICA) Method [PDF]

open access: yesSensors
This manuscript presents a study on the application of blind source separation (BSS) techniques, specifically the Independent Component Analysis (ICA) method, for the detection and identification of localized faults in rolling element bearings.
Dariusz Mika   +2 more
doaj   +2 more sources

Location Privacy Protection Scheme Based on Database-Driven Cognitive Radio Network [PDF]

open access: yesJisuanji gongcheng, 2022
The growing number of wireless devices can result in a shortage of spectrum resources.Dynamic spectrum sharing provides a solution to the problem, but requires users to submit their location to the database to query the availability of spectrum, which ...
XU Xin, WEN Mi
doaj   +1 more source

A Solidity implementation of TAVS

open access: yesFrontiers in Blockchain, 2023
We present a Solidity smart contract implementation of the TAVS e-voting protocol. The Two Authorities Electronic Voting Scheme (TAVS) is a voting scheme that achieves universal verifiability with a reduced time-complexity both for the elector and the ...
Antonio M. Larriba, Damián López
doaj   +1 more source

Two-Party Cooperative Blind Signature Scheme Based on SM9 [PDF]

open access: yesJisuanji gongcheng, 2023
In the existing SM9 blind signature scheme,the signature private key is leaked easily and the signature power is centralized,which are problematic.Hence,a two-party collaborative blind signature scheme based on SM9 is proposed.The Key Generation Center ...
CHEN Qianqian, QIN Baodong
doaj   +1 more source

Efficient and safe auditable mixed-coin service scheme based on blind signature

open access: yes网络与信息安全学报, 2020
The mixed-coin service can provide solutions for the privacy problem of blockchain, but it still faces efficiency bottlenecks and security risks. To further improve the efficiency and security protection of the mixed-coin service, an efficient and safe ...
QIAO Kang, TANG Hongbo, YOU Wei, LI Haitao
doaj   +3 more sources

Quantum-secure message authentication via blind-unforgeability [PDF]

open access: yes, 2020
Formulating and designing unforgeable authentication of classical messages in the presence of quantum adversaries has been a challenge, as the familiar classical notions of unforgeability do not directly translate into meaningful notions in the quantum ...
CH Bennett   +17 more
core   +3 more sources

Security of Blind Signatures Revisited [PDF]

open access: yesJournal of Cryptology, 2012
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Schröder, Dominique, Unruh, Dominique
openaire   +3 more sources

Home - About - Disclaimer - Privacy