搜索结果: 1-15 共查到“军事学 blind signature”相关记录19条 . 查询时间(0.078 秒)
A publicly verifiable quantum blind signature scheme without entanglement based on asymmetric cryptography
Undeniable quantum signature scheme Impersonation attack Quantum asymmetric cryptography
font style='font-size:12px;'>
2019/7/15
In recent years, several cryptographic scholars have proposed quantum blind signature schemes. However, their methods require the signatories and the inspectors to share common keys in advance, which ...
A Practical Multivariate Blind Signature Scheme
Multivariate Cryptography Blind Signatures Rainbow Signature Scheme
font style='font-size:12px;'>
2017/2/20
Multivariate Cryptography is one of the main candidates for creating post-quantum cryptosystems. Especially in the area of digital signatures, there exist many practical and secure multivariate scheme...
Isogeny-based Quantum-resistant Undeniable Blind Signature Scheme
post-quantum cryptography isogeny-based cryptography
font style='font-size:12px;'>
2016/2/23
In this paper, we propose an Undeniable Blind Signature
scheme (UBSS) based on isogenies between supersingular elliptic curves.
The proposed UBSS is an extension of the Jao-Soukharev undeniable
sig...
A Secure Obfuscator for Encrypted Blind Signature Functionality
Obfuscation Blind signature Indistinguishable security
font style='font-size:12px;'>
2014/3/6
This paper introduces a new obfuscation called obfuscation of encrypted blind signature. Informally, Alice is Signer and Bob is User. Bob needs Alice to sign a message, but he does not want Alice to k...
A Strong Blind Signature Scheme over Braid Groups
Braid Group Blind Signature One-more Matching Conjugacy Random Oracle Model
font style='font-size:12px;'>
2009/12/29
The rapid development of quantum computing makes public key cryptosystems not based on commutative algebraic systems hot topic. Because of the non-commutativity property, the braid group with braid in...
Double Voter Perceptible Blind Signature Based Electronic Voting Protocol
Electronic voting Anonymity of voter Unforgeability of ticket
font style='font-size:12px;'>
2009/9/2
Mu et al. proposed an electronic voting protocol and claimed that it protects
voter's anonymity, detects double voting and authenticates eligible voters. It
has been shown that it does not protect v...
On the Security of a Proxy Blind Signature Scheme over Braid Groups
Security Proxy Blind Signature Scheme Braid Groups
font style='font-size:12px;'>
2009/7/22
A proxy blind signature scheme is the combination of
proxy signature and blind signature scheme. In 2009,Verma
proposed a proxy blind signature scheme over braid groups.
Verma claimed that the prop...
Linkability of Blind Signature Schemes over Braid Groups
Linkability Blind Signature Schemes Braid Groups
font style='font-size:12px;'>
2009/6/12
Blindness and unforgeability are two essential security
requirements of a secure blind signature scheme.
Blindness means that after interacting with various
users, the signer can never be able to l...
Blind signature scheme over Braid groups
Blind signature Braid groups Conjugcy search problem
font style='font-size:12px;'>
2009/6/2
A blind signature scheme is a cryptographic protocol for
obtaining a signature from a signer such that the signer’s view of the
protocol cannot be linked to the resulting message signature pair. In ...
The One-More-RSA-Inversion Problems and the Security of Chaum’s Blind Signature Scheme
RSA blind signatures
font style='font-size:12px;'>
2009/4/16
We introduce a new class of computational problems which we call the “one-more-RSAinversion”
problems. Our main result is that two problems in this class, which we call the
chosen-target and known-t...
Efficient threshold signature, multisignature and blind signature schemes based on the Gap-Diffe-Hellman-group signature scheme
Signature schemes threshold signatures multisignatures
font style='font-size:12px;'>
2009/4/15
We propose a robust proactive threshold signature scheme, a multisignature scheme and a
blind signature scheme which work in any Gap Die-Hellman (GDH) group (where the Computational
Die-Hellman pr...
New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairings
Proxy signature ID-based cryptography Proxy blind signature Proxy ring signature
font style='font-size:12px;'>
2009/4/9
Proxy signatures are very useful tools when one needs to
delegate his/her signing capability to other party. After Mambo et al:’s
first scheme was announced, many proxy signature schemes and various...
Proxy Blind Signature Scheme“Revised Version”
Proxy Signature Blind Signature Proxy-Blind
font style='font-size:12px;'>
2009/4/8
Blind signature is the concept to ensure anonymity of e-coins. Untracebility and unlinkability are two main properties of real coins, which require mimicking electronically. Whenever a user is permitt...
On a Threshold Group Signature Scheme and a Fair Blind Signature Scheme
threshold group signature scheme fair blind signature scheme universal forgeability
font style='font-size:12px;'>
2009/4/1
In the paper, we analyze two signature schemes. The ¯rst is a (tj ; t; n)
threshold group signature scheme proposed by Shi and Feng in [1]. The second is a fair
blind signature scheme proposed ...
Universal Forgeability of a Forward-Secure Blind Signature Scheme Proposed by Duc et al.
Blind signature Universal forgeability
font style='font-size:12px;'>
2009/3/31
Duc et al. proposed a forward-secure blind signature scheme in
[1]. They claimed that the scheme is constructed from the provably secure Okamoto-
Guilou-Quisquater blind signature scheme. But we rec...