Results 11 to 20 of about 1,372,166 (300)
A Solidity implementation of TAVS
We present a Solidity smart contract implementation of the TAVS e-voting protocol. The Two Authorities Electronic Voting Scheme (TAVS) is a voting scheme that achieves universal verifiability with a reduced time-complexity both for the elector and the ...
Antonio M. Larriba, Damián López
doaj +1 more source
Lattice-Based Blind Signatures: Short, Efficient, and Round-Optimal
We propose a 2-round blind signature protocol based on the random oracle heuristic and the hardness of standard lattice problems (Ring/Module-SIS/LWE and NTRU) with a signature size of 20 KB.
Ward Beullens +3 more
semanticscholar +1 more source
Two-Party Cooperative Blind Signature Scheme Based on SM9 [PDF]
In the existing SM9 blind signature scheme,the signature private key is leaked easily and the signature power is centralized,which are problematic.Hence,a two-party collaborative blind signature scheme based on SM9 is proposed.The Key Generation Center ...
CHEN Qianqian, QIN Baodong
doaj +1 more source
Quantum-secure message authentication via blind-unforgeability [PDF]
Formulating and designing unforgeable authentication of classical messages in the presence of quantum adversaries has been a challenge, as the familiar classical notions of unforgeability do not directly translate into meaningful notions in the quantum ...
CH Bennett +17 more
core +3 more sources
Efficient and safe auditable mixed-coin service scheme based on blind signature
The mixed-coin service can provide solutions for the privacy problem of blockchain, but it still faces efficiency bottlenecks and security risks. To further improve the efficiency and security protection of the mixed-coin service, an efficient and safe ...
QIAO Kang, TANG Hongbo, YOU Wei, LI Haitao
doaj +3 more sources
A New Post-Quantum Blind Signature From Lattice Assumptions
At present, several post-quantum cryptosystems have been proposed, and lattice-based cryptography is the main candidate. Especially in the direction of digital signatures, there are now many practical lattice-based signature schemes. However, there exist
Pingyuan Zhang +4 more
doaj +1 more source
Post-Quantum Secure Identity-Based Proxy Blind Signature Scheme on a Lattice
Blind signatures have been widely applied when privacy preserving is required, and the delegation of blind signature rights and a proxy blind signature (Proxy-BS) become necessary when the signer cannot sign.
Fengyin Li +4 more
doaj +1 more source
Sparsity and morphological diversity for hyperspectral data analysis [PDF]
Recently morphological diversity and sparsity have emerged as new and effective sources of diversity for Blind Source Separation. Based on these new concepts, novelmethods such as Generalized Morphological Component Analysis have been put forward ...
Bobin, J. +3 more
core +1 more source
CAUDHT: Decentralized Contact Tracing Using a DHT and Blind Signatures
Contact tracing is a promising approach to combat the COVID-19 pandemic. Various systems have been proposed to automatise the process. Many designs rely heavily on a centralised server or reveal significant amounts of private data to health authorities ...
Samuel Brack +2 more
semanticscholar +1 more source
Partial blind signature scheme based on SM9 algorithm
Ordinary digital signatures have many deficiencies in effectively protecting users' privacy, and signature repudiation and tracking occur from time to time. In order to solve the above problems, a partial blind signature scheme based on the SM9 algorithm
LYU Yao +2 more
doaj +3 more sources

