Journal articles on the topic 'Blind signature scheme'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Blind signature scheme.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Deng, Yu Qiao. "A Blind Proxy Re-Signatures Scheme Based on Random Oracle." Advanced Materials Research 204-210 (February 2011): 1062–65. http://dx.doi.org/10.4028/www.scientific.net/amr.204-210.1062.
Full textHoang Duong, Dung, Willy Susilo, and Ha Thanh Nguyen Tran. "A Multivariate Blind Ring Signature Scheme." Computer Journal 63, no. 8 (November 26, 2019): 1194–202. http://dx.doi.org/10.1093/comjnl/bxz128.
Full textZhang, Jian Hong, Hua Chen, and Yi Xian Yang. "Efficient Blind Signature Scheme Based on Modified Generalized Bilinear Inversion." Key Engineering Materials 439-440 (June 2010): 1265–70. http://dx.doi.org/10.4028/www.scientific.net/kem.439-440.1265.
Full textTan, Duc Nguyen, Hai Nguyen Nam, Minh Nguyen Hieu, and Hiep Nguyen Van. "New Blind Muti-signature Schemes based on ECDLP." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 2 (April 1, 2018): 1074. http://dx.doi.org/10.11591/ijece.v8i2.pp1074-1083.
Full textZhang, Weijian, Zhimin Guo, Nuannuan Li, Mingyan Li, Qing Fan, and Min Luo. "A Blind Signature-Aided Privacy-Preserving Power Request Scheme for Smart Grid." Wireless Communications and Mobile Computing 2021 (June 29, 2021): 1–10. http://dx.doi.org/10.1155/2021/9988170.
Full textZhou, Xuan Wu. "Fast Public Key Cryptosystem Based Blind Signature Scheme." Applied Mechanics and Materials 20-23 (January 2010): 505–11. http://dx.doi.org/10.4028/www.scientific.net/amm.20-23.505.
Full textMa, Li Zhen. "Efficient Convertible User Designating Confirmer Partially Blind Signature with Provable Security." Advanced Materials Research 282-283 (July 2011): 307–11. http://dx.doi.org/10.4028/www.scientific.net/amr.282-283.307.
Full textCAI, XIAO-QIU, and HUI-FANG NIU. "PARTIALLY BLIND SIGNATURES BASED ON QUANTUM CRYPTOGRAPHY." International Journal of Modern Physics B 26, no. 30 (October 7, 2012): 1250163. http://dx.doi.org/10.1142/s0217979212501639.
Full textJames, Salome, T. Gowri, G. V. Ramesh Babu, and P. Vasudeva Reddy. "Identity-Based Blind Signature Scheme with Message Recovery." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 5 (October 1, 2017): 2674. http://dx.doi.org/10.11591/ijece.v7i5.pp2674-2682.
Full textManoj Kumar Chande. "An improved proxy blind signature scheme based on ECDLP." Malaya Journal of Matematik 2, no. 03 (July 1, 2014): 228–35. http://dx.doi.org/10.26637/mjm203/007.
Full textLi, Fengyin, Mengjiao Yang, Zhihao Song, Ping Wang, and Guoping Li. "Post-Quantum Secure Identity-Based Proxy Blind Signature Scheme on a Lattice." Entropy 25, no. 8 (August 2, 2023): 1157. http://dx.doi.org/10.3390/e25081157.
Full textChen, Min Qin, Qiao Yan Wen, Zheng Ping Jin, and Hua Zhang. "Secure and Efficient Certificateless Signature and Blind Signature Scheme from Pairings." Applied Mechanics and Materials 457-458 (October 2013): 1262–65. http://dx.doi.org/10.4028/www.scientific.net/amm.457-458.1262.
Full textZhang, Lili, and Yanqin Ma. "A Lattice-Based Identity-Based Proxy Blind Signature Scheme in the Standard Model." Mathematical Problems in Engineering 2014 (2014): 1–6. http://dx.doi.org/10.1155/2014/307637.
Full textWang, Xin De, Jing Liang Zhang, and Zheng Tao Jiang. "Research on Fair E-Payment Protocol Based on Partially Blind Signature with Analysis of Scientific Material." Advanced Materials Research 282-283 (July 2011): 449–52. http://dx.doi.org/10.4028/www.scientific.net/amr.282-283.449.
Full textZhu, Hongfei, Yu-an Tan, Liehuang Zhu, Quanxin Zhang, and Yuanzhang Li. "An Efficient Identity-Based Proxy Blind Signature for Semioffline Services." Wireless Communications and Mobile Computing 2018 (2018): 1–9. http://dx.doi.org/10.1155/2018/5401890.
Full textTian, Yuan, Hong Chen, Yan Gao, Honglin Zhuang, Haigang Lian, Zhengping Han, Peng Yu, Xiangze Kong, and Xiaojun Wen. "A broadcasting multiple blind signature scheme based on quantum GHZ entanglement." International Journal of Modern Physics: Conference Series 33 (January 2014): 1460369. http://dx.doi.org/10.1142/s201019451460369x.
Full textZhou, Xuan Wu, and Yan Fu. "Blind Signature Based on Discrete Logarithm Type Cryptosystem." Advanced Materials Research 204-210 (February 2011): 1318–21. http://dx.doi.org/10.4028/www.scientific.net/amr.204-210.1318.
Full textPanda, Suryakanta, and Ramesh Kumar Mohapatra. "Stamped Proxy Blind Signature Scheme." International Journal of Computer Applications 64, no. 15 (February 15, 2013): 38–41. http://dx.doi.org/10.5120/10713-5690.
Full textGAO, Wei, Fei LI, and Bang-hai XU. "Identity-based blind signature scheme based on BLS signatures." Journal of Computer Applications 28, no. 11 (June 5, 2009): 2827–28. http://dx.doi.org/10.3724/sp.j.1087.2008.02827.
Full textLu, Erl Huei, Henry Ker Chang Chang, Shu Hwang Liaw, and Pin Chang Su. "Proven Security and Efficiency of Gap Diffie-Hellman Group Blind Signature in E-Commerce." Applied Mechanics and Materials 284-287 (January 2013): 3522–26. http://dx.doi.org/10.4028/www.scientific.net/amm.284-287.3522.
Full textWu, Rui, and Shi Ping Yang. "Application of Identity-Based Blind Signature in the Performance Evaluation." Advanced Materials Research 846-847 (November 2013): 1652–55. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.1652.
Full textJames, Salome, N. B. Gayathri, and P. Vasudeva Reddy. "Pairing Free Identity-Based Blind Signature Scheme with Message Recovery." Cryptography 2, no. 4 (October 9, 2018): 29. http://dx.doi.org/10.3390/cryptography2040029.
Full textChen, Feng-Lin, Zhi-Hua Wang, and Yong-Mo Hu. "A New Quantum Blind Signature Scheme with BB84-State." Entropy 21, no. 4 (March 28, 2019): 336. http://dx.doi.org/10.3390/e21040336.
Full textXie, Yi-Yang, Xiu-Bo Chen, and Yi-Xian Yang. "A New Lattice-Based Blind Ring Signature for Completely Anonymous Blockchain Transaction Systems." Security and Communication Networks 2022 (September 1, 2022): 1–12. http://dx.doi.org/10.1155/2022/4052029.
Full textDuo, Chun Hong. "A Multibank E-Cash System Based on Group Signature Scheme." Applied Mechanics and Materials 321-324 (June 2013): 2987–90. http://dx.doi.org/10.4028/www.scientific.net/amm.321-324.2987.
Full textZhang, Jianhong, Yuanbo Cui, and Zhipeng Chen. "Security of Proxy Blind Signature Scheme." Information Technology Journal 12, no. 3 (January 15, 2013): 466–69. http://dx.doi.org/10.3923/itj.2013.466.469.
Full textLEI, Zhi-jun. "Cryptanalysis of proxy blind signature scheme." Journal of Computer Applications 28, no. 5 (October 17, 2008): 1144–45. http://dx.doi.org/10.3724/sp.j.1087.2008.01144.
Full textWEI, Chun-yan, and Xiao-qiu CAI. "New certificateless proxy blind signature scheme." Journal of Computer Applications 30, no. 12 (January 6, 2011): 3341–42. http://dx.doi.org/10.3724/sp.j.1087.2010.03341.
Full textTang, Qiaoying, and Fengxian Shen. "Identity-Based Xtr Blind Signature Scheme." Intelligent Automation & Soft Computing 19, no. 2 (April 2013): 143–49. http://dx.doi.org/10.1080/10798587.2013.786967.
Full textFan, Chun-I., Wei-Kuei Chen, and Yi-Shung Yeh. "Randomization enhanced Chaum's blind signature scheme." Computer Communications 23, no. 17 (November 2000): 1677–80. http://dx.doi.org/10.1016/s0140-3664(00)00254-1.
Full textShi, JinJing, RongHua Shi, Ying Guo, XiaoQi Peng, and Ying Tang. "Batch proxy quantum blind signature scheme." Science China Information Sciences 56, no. 5 (September 9, 2011): 1–9. http://dx.doi.org/10.1007/s11432-011-4422-5.
Full textFan, Kai, Yue Wang, and Hui Li. "A new proxy blind signature scheme." International Journal of Grid and Utility Computing 3, no. 1 (2012): 38. http://dx.doi.org/10.1504/ijguc.2012.045709.
Full textZuo, Huijuan. "Cryptanalysis of Quantum Blind Signature Scheme." International Journal of Theoretical Physics 52, no. 1 (September 15, 2012): 322–29. http://dx.doi.org/10.1007/s10773-012-1337-x.
Full textGuo, Xi, Jian-Zhong Zhang, and Shu-Cui Xie. "An Improved Proxy Blind Signature Scheme." International Journal of Theoretical Physics 58, no. 2 (October 23, 2018): 354–63. http://dx.doi.org/10.1007/s10773-018-3936-7.
Full textCheng, Lin, Qiao Yan Wen, and Dong Bo. "Cryptanalysis of a Certificateless Partially Blind Signature." Applied Mechanics and Materials 519-520 (February 2014): 462–65. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.462.
Full textSha, Li Min. "Improvement of a Proxy Blind Multi-Signature Scheme." Applied Mechanics and Materials 631-632 (September 2014): 1198–202. http://dx.doi.org/10.4028/www.scientific.net/amm.631-632.1198.
Full textChen, Jingjing, and Fucheng You. "A Quantum Multi-Agent Blind Signature Scheme with Unordered Signatures." Journal of Physics: Conference Series 1883, no. 1 (April 1, 2021): 012076. http://dx.doi.org/10.1088/1742-6596/1883/1/012076.
Full textWu, Chien-Nan, Chun-I. Fan, Jheng-Jia Huang, Yi-Fan Tseng, and Hiroaki Kikuchi. "Probably Secure Efficient Anonymous Credential Scheme." International Journal of Software Innovation 6, no. 3 (July 2018): 18–35. http://dx.doi.org/10.4018/ijsi.2018070102.
Full textDONG, GUOFAGN, FEI GAO, WENBO SHI, and PENG GONG. "An efficient certificateless blind signature scheme without bilinear pairing." Anais da Academia Brasileira de Ciências 86, no. 2 (June 2014): 1003–11. http://dx.doi.org/10.1590/0001-3765201420130199.
Full textZhang, Mei Na, Chun Bao Fu, and Wei Fu. "Two New Electronic Cash Schemes Based on Elliptic Curve." Advanced Materials Research 694-697 (May 2013): 2388–93. http://dx.doi.org/10.4028/www.scientific.net/amr.694-697.2388.
Full textWang, Yi. "Structure and Analysis of Certificateless Proxy Blind Signature Scheme without Bilinear Pairing." Advanced Materials Research 734-737 (August 2013): 3194–98. http://dx.doi.org/10.4028/www.scientific.net/amr.734-737.3194.
Full textChatterjee, Sanjit, M. Prem Laxman Das, and R. Kabaleeshwaran. "Converting pairing-based cryptosystems from composite to prime order setting – A comparative analysis." Journal of Mathematical Cryptology 12, no. 3 (September 1, 2018): 159–90. http://dx.doi.org/10.1515/jmc-2017-0042.
Full textLee, Hakjun. "A Quantum Resistant Lattice-based Blind Signature Scheme for Blockchain." Korean Institute of Smart Media 12, no. 2 (March 30, 2023): 76–82. http://dx.doi.org/10.30693/smj.2023.12.2.76.
Full textFan, Ling, and Cong Cao. "A synchronous quantum blind signature scheme with entanglement swapping." International Journal of Quantum Information 17, no. 01 (February 2019): 1950007. http://dx.doi.org/10.1142/s0219749919500072.
Full textHuang, Ru Fen, and Qiang Nong. "Efficient Certificate-Based Blind Signature Scheme without Bilinear Pairings." Applied Mechanics and Materials 220-223 (November 2012): 2735–39. http://dx.doi.org/10.4028/www.scientific.net/amm.220-223.2735.
Full textZhang, Long, and Shu Yi Lu. "A Strong Forward-Secure Proxy Blind Signature Scheme." Advanced Materials Research 457-458 (January 2012): 1391–96. http://dx.doi.org/10.4028/www.scientific.net/amr.457-458.1391.
Full textLiu, Guang Liang, Sheng Xian Xie, and Wei Fu. "(t,k,n) Multi-Blind Proxy Signature Scheme on Elliptic Curve." Applied Mechanics and Materials 130-134 (October 2011): 291–94. http://dx.doi.org/10.4028/www.scientific.net/amm.130-134.291.
Full textPing Pan, Licheng Wang, Chenqian Xu, and Yixian Yang. "Blind Signature Scheme over Inner Automorphism Group." International Journal of Digital Content Technology and its Applications 6, no. 19 (October 31, 2012): 538–45. http://dx.doi.org/10.4156/jdcta.vol6.issue19.65.
Full textWANG, Zhen, Pei-yu LIU, and Feng-yin LI. "New certificateless threshold proxy blind signature scheme." Journal of Computer Applications 32, no. 11 (May 27, 2013): 3140–42. http://dx.doi.org/10.3724/sp.j.1087.2012.03140.
Full textLI, Xihe, and Xiaodong YANG. "Improved bidirectional blind proxy re-signature scheme." Journal of Computer Applications 33, no. 2 (September 24, 2013): 447–49. http://dx.doi.org/10.3724/sp.j.1087.2013.00447.
Full text