Results 231 to 240 of about 122,299 (291)

Short blind signatures

Journal of Computer Security, 2013
Blind signatures allow users to obtain signatures on messages hidden from the signer; moreover, the signer cannot link the resulting message/signature pair to the signing session. This paper presents blind signature schemes, in which the number of interactions between the user and the signer is minimal and whose blind signatures are short.
Blazy, Olivier   +3 more
openaire   +1 more source

Certificateless signature and blind signature

Journal of Electronics (China), 2008
Certificateless public key cryptography is a new paradigm introduced by Al-Riyami and Paterson. It eliminates the need of the certificates in traditional public key cryptosystems and the key escrow problem in IDentity-based Public Key Cryptography (ID-PKC).
Lei Zhang, Futai Zhang
openaire   +1 more source

Blind Quantum Signature with Blind Quantum Computation

International Journal of Theoretical Physics, 2016
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Li, Wei, Shi, Ronghua, Guo, Ying
openaire   +1 more source

Blinded-key signatures

Proceedings of the 2002 ACM symposium on Applied computing, 2002
We present a new cryptographic primitive, the blinded-key signature, which allows the inclusion of private keys in autonomous mobile agents. This novel approach can be applied to many well-known digital signature schemes, such as RSA and ElGammal.
Lucas C. Ferreira, Ricardo Dahab
openaire   +1 more source

On the security of blind signature and partially blind signature

2010 2nd International Conference on Education Technology and Computer, 2010
Blind signature allows a user to obtain a signature from an authority on any document, in such a way that the authority learns nothing about the message that is being signed. The blindness is an important property which distinguishes the blind signature from other signature schemes.
null Baoyuan Kang, null Jinguang Han
openaire   +1 more source

Security Arguments for Digital Signatures and Blind Signatures

Journal of Cryptology, 2000
This paper proves the security of a large class of signature schemes in the so-called random oracle model. This model assumes that the hash function used in a signature scheme behaves as a random function. However, it has been shown that there exist (contrived) schemes that are provably secure in the random oracle model, but not when used with a real ...
Pointcheval, David, Stern, Jacques
openaire   +1 more source

Home - About - Disclaimer - Privacy