Results 11 to 20 of about 1,372,166 (300)

A Solidity implementation of TAVS

open access: yesFrontiers in Blockchain, 2023
We present a Solidity smart contract implementation of the TAVS e-voting protocol. The Two Authorities Electronic Voting Scheme (TAVS) is a voting scheme that achieves universal verifiability with a reduced time-complexity both for the elector and the ...
Antonio M. Larriba, Damián López
doaj   +1 more source

Lattice-Based Blind Signatures: Short, Efficient, and Round-Optimal

open access: yesIACR Cryptology ePrint Archive, 2023
We propose a 2-round blind signature protocol based on the random oracle heuristic and the hardness of standard lattice problems (Ring/Module-SIS/LWE and NTRU) with a signature size of 20 KB.
Ward Beullens   +3 more
semanticscholar   +1 more source

Two-Party Cooperative Blind Signature Scheme Based on SM9 [PDF]

open access: yesJisuanji gongcheng, 2023
In the existing SM9 blind signature scheme,the signature private key is leaked easily and the signature power is centralized,which are problematic.Hence,a two-party collaborative blind signature scheme based on SM9 is proposed.The Key Generation Center ...
CHEN Qianqian, QIN Baodong
doaj   +1 more source

Quantum-secure message authentication via blind-unforgeability [PDF]

open access: yes, 2020
Formulating and designing unforgeable authentication of classical messages in the presence of quantum adversaries has been a challenge, as the familiar classical notions of unforgeability do not directly translate into meaningful notions in the quantum ...
CH Bennett   +17 more
core   +3 more sources

Efficient and safe auditable mixed-coin service scheme based on blind signature

open access: yes网络与信息安全学报, 2020
The mixed-coin service can provide solutions for the privacy problem of blockchain, but it still faces efficiency bottlenecks and security risks. To further improve the efficiency and security protection of the mixed-coin service, an efficient and safe ...
QIAO Kang, TANG Hongbo, YOU Wei, LI Haitao
doaj   +3 more sources

A New Post-Quantum Blind Signature From Lattice Assumptions

open access: yesIEEE Access, 2018
At present, several post-quantum cryptosystems have been proposed, and lattice-based cryptography is the main candidate. Especially in the direction of digital signatures, there are now many practical lattice-based signature schemes. However, there exist
Pingyuan Zhang   +4 more
doaj   +1 more source

Post-Quantum Secure Identity-Based Proxy Blind Signature Scheme on a Lattice

open access: yesEntropy, 2023
Blind signatures have been widely applied when privacy preserving is required, and the delegation of blind signature rights and a proxy blind signature (Proxy-BS) become necessary when the signer cannot sign.
Fengyin Li   +4 more
doaj   +1 more source

Sparsity and morphological diversity for hyperspectral data analysis [PDF]

open access: yes, 2010
Recently morphological diversity and sparsity have emerged as new and effective sources of diversity for Blind Source Separation. Based on these new concepts, novelmethods such as Generalized Morphological Component Analysis have been put forward ...
Bobin, J.   +3 more
core   +1 more source

CAUDHT: Decentralized Contact Tracing Using a DHT and Blind Signatures

open access: yesIEEE Conference on Local Computer Networks, 2020
Contact tracing is a promising approach to combat the COVID-19 pandemic. Various systems have been proposed to automatise the process. Many designs rely heavily on a centralised server or reveal significant amounts of private data to health authorities ...
Samuel Brack   +2 more
semanticscholar   +1 more source

Partial blind signature scheme based on SM9 algorithm

open access: yes网络与信息安全学报, 2021
Ordinary digital signatures have many deficiencies in effectively protecting users' privacy, and signature repudiation and tracking occur from time to time. In order to solve the above problems, a partial blind signature scheme based on the SM9 algorithm
LYU Yao   +2 more
doaj   +3 more sources

Home - About - Disclaimer - Privacy