Results 241 to 250 of about 1,372,166 (300)
Some of the next articles are maybe not open access.
Practical, Round-Optimal Lattice-Based Blind Signatures
Conference on Computer and Communications Security, 2022Blind signatures are a fundamental cryptographic primitive with numerous practical applications. While there exist many practical blind signatures from number-theoretic assumptions, the situation is far less satisfactory from post-quantum assumptions. In
Shweta Agrawal +3 more
semanticscholar +1 more source
Certificateless signature and blind signature
Journal of Electronics (China), 2008Certificateless public key cryptography is a new paradigm introduced by Al-Riyami and Paterson. It eliminates the need of the certificates in traditional public key cryptosystems and the key escrow problem in IDentity-based Public Key Cryptography (ID-PKC).
Lei Zhang, Futai Zhang
openaire +1 more source
Blind Quantum Signature with Blind Quantum Computation
International Journal of Theoretical Physics, 2016zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Li, Wei, Shi, Ronghua, Guo, Ying
openaire +1 more source
Lattice Blind Signatures with Forward Security
Australasian Conference on Information Security and Privacy, 2020Blind signatures play an important role in both electronic cash and electronic voting systems. Blind signatures should be secure against various attacks (such as signature forgeries).
H. Q. Le +6 more
semanticscholar +1 more source
Proceedings of the 2002 ACM symposium on Applied computing, 2002
We present a new cryptographic primitive, the blinded-key signature, which allows the inclusion of private keys in autonomous mobile agents. This novel approach can be applied to many well-known digital signature schemes, such as RSA and ElGammal.
Lucas C. Ferreira, Ricardo Dahab
openaire +1 more source
We present a new cryptographic primitive, the blinded-key signature, which allows the inclusion of private keys in autonomous mobile agents. This novel approach can be applied to many well-known digital signature schemes, such as RSA and ElGammal.
Lucas C. Ferreira, Ricardo Dahab
openaire +1 more source
RSA Blind Signatures with Public Metadata
IACR Cryptology ePrint ArchiveAnonymous tokens are, essentially, digital signature schemes that enable issuers to provide users with signatures without learning the user inputs or the final signatures.
Ghous Amjad, Kevin Yeo, M. Yung
semanticscholar +1 more source
On the security of blind signature and partially blind signature
2010 2nd International Conference on Education Technology and Computer, 2010Blind signature allows a user to obtain a signature from an authority on any document, in such a way that the authority learns nothing about the message that is being signed. The blindness is an important property which distinguishes the blind signature from other signature schemes.
null Baoyuan Kang, null Jinguang Han
openaire +1 more source
Blind Schnorr Signatures and Signed ElGamal Encryption in the Algebraic Group Model
International Conference on the Theory and Application of Cryptographic Techniques, 2020The Schnorr blind signing protocol allows blind issuing of Schnorr signatures, one of the most widely used signatures. Despite its practical relevance, its security analysis is unsatisfactory.
Georg Fuchsbauer +2 more
semanticscholar +1 more source
An Efficient ID Based Proxy Signature, Proxy Blind Signature and Proxy Partial Blind Signature
2008 International Conference on Information Technology, 2008Identity-based (ID based) public key cryptosystem gives an efficient alternative for key management as compared to certificate based public key settings. A proxy signature is a method for an entity to delegate signing capabilities to other participants so that they can sign on behalf of the entity with in a given context.
Banshidhar Majhi +2 more
openaire +1 more source

