Results 241 to 250 of about 122,299 (291)
Some of the next articles are maybe not open access.
An Efficient ID Based Proxy Signature, Proxy Blind Signature and Proxy Partial Blind Signature
2008 International Conference on Information Technology, 2008Identity-based (ID based) public key cryptosystem gives an efficient alternative for key management as compared to certificate based public key settings. A proxy signature is a method for an entity to delegate signing capabilities to other participants so that they can sign on behalf of the entity with in a given context.
Banshidhar Majhi +2 more
openaire +1 more source
Cryptoanalysis of Certificateless Partially Blind Signature and Proxy Blind Signature Scheme
2009 2nd International Congress on Image and Signal Processing, 2009Blind signature and proxy signature are two im- portant crytographical primitives. Unforgeability is a primitive property of digital signature, it assures that any one cannot produce a forged signature on a message except the signer. However, blindness is an important property which distinguish with other signatures.
Jianhong Zhang, Hua Chen, Qin Geng
openaire +1 more source
Certificateless Partially Blind Signatures
2009 First International Conference on Information Science and Engineering, 2009Partially blind signature is a variant of blind signature. It allows a signer to explicitly include common information in a blind signature under some agreement with a receiver. It provides anonymity of users in applications such as electronic voting and electronic payment systems. While certificateless public key cryptography eliminates the key escrow
Lei Zhang, Futai Zhang
openaire +1 more source
A Blind Signature Protocol with Exchangeable Signature Sequence
International Journal of Theoretical Physics, 2018zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire +2 more sources
ID-Based Blind Signature and Proxy Blind Signature without Trusted PKG
2008Private key escrow is an inherent disadvantage for ID-based cryptosystem, i.e., the PKG knows each signer’s private key and can forge the signature of any signer. Blind signature plays a central role in electronic cash system. Private key escrow is more severe in electronic cash system since money is directly involved.
Yihua Yu, Shihui Zheng, Yixian Yang
openaire +1 more source
Optimistic blinded-key signatures
IEEE First Symposium onMulti-Agent Security and Survivability, 2004, 2004If autonomous mobile agents are to be used in electronic commerce environments, they must be able to sign contracts and payment orders without the need to contact their owners. As agents execute in untrusted environments, it is assumed that any information they carry can be read by a malicious host; thus, it is unwise to include secrets, such as ...
L.C. Ferreira, R. Dahab
openaire +1 more source
Certificateless Partially Blind Signature
2012 26th International Conference on Advanced Information Networking and Applications Workshops, 2012Blind signatures play a central role in applications such as e-cash and e-voting systems, while partially blind signature is an even more applicable variant. This paper proposes a Certificate less Partially Blind Signature (CPBS) by laying its construction on bilinear pairings over Gap Diffie-Hellman (GDH) Group for solving the key escrow problem in ...
Jingwei Liu +3 more
openaire +1 more source
Round-Optimal Blind Signatures from Waters Signatures
2008We present a round-optimal blind signature scheme based on Waters' signature scheme. Our construction resembles that of Fischlin [10], but does not rely on generic non-interactive zero-knowledge proofs. In addition to a common reference string, our scheme requires a registered public key for the signer.
Kristian Gjøsteen, Lillian Kråkmo
openaire +1 more source
Blind Signature Schemes Based on Gost Signature
2006In this paper, the authors propose a generalized blind GOST signature scheme and three practical blind GOST signature schemes educed from the proposed generalized scheme by setting one of three parameters be a constant.
Zhenjie Huang, Yumin Wang
openaire +1 more source
Fair Partially Blind Signatures
2010It is well-known that blind signature schemes provide full anonymity for the receiving user. For many real-world applications, however, this leaves too much room for fraud. There are two generalizations of blind signature schemes that compensate this weakness: fair blind signatures and partially blind signatures.
Markus Rückert, Dominique Schröder
openaire +1 more source

