Gotowa bibliografia na temat „Blind signature scheme”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Blind signature scheme”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Blind signature scheme"
Deng, Yu Qiao. "A Blind Proxy Re-Signatures Scheme Based on Random Oracle". Advanced Materials Research 204-210 (luty 2011): 1062–65. http://dx.doi.org/10.4028/www.scientific.net/amr.204-210.1062.
Pełny tekst źródłaHoang Duong, Dung, Willy Susilo i Ha Thanh Nguyen Tran. "A Multivariate Blind Ring Signature Scheme". Computer Journal 63, nr 8 (26.11.2019): 1194–202. http://dx.doi.org/10.1093/comjnl/bxz128.
Pełny tekst źródłaZhang, Jian Hong, Hua Chen i Yi Xian Yang. "Efficient Blind Signature Scheme Based on Modified Generalized Bilinear Inversion". Key Engineering Materials 439-440 (czerwiec 2010): 1265–70. http://dx.doi.org/10.4028/www.scientific.net/kem.439-440.1265.
Pełny tekst źródłaTan, Duc Nguyen, Hai Nguyen Nam, Minh Nguyen Hieu i Hiep Nguyen Van. "New Blind Muti-signature Schemes based on ECDLP". International Journal of Electrical and Computer Engineering (IJECE) 8, nr 2 (1.04.2018): 1074. http://dx.doi.org/10.11591/ijece.v8i2.pp1074-1083.
Pełny tekst źródłaZhang, Weijian, Zhimin Guo, Nuannuan Li, Mingyan Li, Qing Fan i Min Luo. "A Blind Signature-Aided Privacy-Preserving Power Request Scheme for Smart Grid". Wireless Communications and Mobile Computing 2021 (29.06.2021): 1–10. http://dx.doi.org/10.1155/2021/9988170.
Pełny tekst źródłaZhou, Xuan Wu. "Fast Public Key Cryptosystem Based Blind Signature Scheme". Applied Mechanics and Materials 20-23 (styczeń 2010): 505–11. http://dx.doi.org/10.4028/www.scientific.net/amm.20-23.505.
Pełny tekst źródłaMa, Li Zhen. "Efficient Convertible User Designating Confirmer Partially Blind Signature with Provable Security". Advanced Materials Research 282-283 (lipiec 2011): 307–11. http://dx.doi.org/10.4028/www.scientific.net/amr.282-283.307.
Pełny tekst źródłaCAI, XIAO-QIU, i HUI-FANG NIU. "PARTIALLY BLIND SIGNATURES BASED ON QUANTUM CRYPTOGRAPHY". International Journal of Modern Physics B 26, nr 30 (7.10.2012): 1250163. http://dx.doi.org/10.1142/s0217979212501639.
Pełny tekst źródłaJames, Salome, T. Gowri, G. V. Ramesh Babu i P. Vasudeva Reddy. "Identity-Based Blind Signature Scheme with Message Recovery". International Journal of Electrical and Computer Engineering (IJECE) 7, nr 5 (1.10.2017): 2674. http://dx.doi.org/10.11591/ijece.v7i5.pp2674-2682.
Pełny tekst źródłaManoj Kumar Chande. "An improved proxy blind signature scheme based on ECDLP". Malaya Journal of Matematik 2, nr 03 (1.07.2014): 228–35. http://dx.doi.org/10.26637/mjm203/007.
Pełny tekst źródłaRozprawy doktorskie na temat "Blind signature scheme"
Maitland, Gregory. "Design of practical electronic cash schemes". Thesis, Queensland University of Technology, 2003.
Znajdź pełny tekst źródłaHuang, Ren-Shang, i 黃任賞. "Blind Signature Scheme with Anonymous Verification". Thesis, 2010. http://ndltd.ncl.edu.tw/handle/92137150916184951504.
Pełny tekst źródła國立中山大學
資訊工程學系研究所
98
In an anonymous credential system, when a credential has been shown for verification, none can identify the owner of the credential and link the relationship between any two credentials. The unlinkability is the crucial feature for any anonymous credential system. In 2002, Jan Camenisch and Anna Lysyanskaya proposed a signature scheme (CL signature) which allows users to demonstrate their credentials without revealing their identity information. However, CL signature is compounded of a lot of zero-knowledge proof technologies which cause inefficiency for CL signatures. Such heavy computation requirements may limit the scope which CL signatures can be applied to. In this thesis, we propose a new blind signature scheme based on ElGamal signatures and design an anonymous verification procedure which is more efficient than the CL signature scheme. Finally, we also implement our proposed protocols.
Muduli, J. P., i S. K. Parida. "A Blind Signature Scheme using Biometric Feature Value". Thesis, 2010. http://ethesis.nitrkl.ac.in/1672/1/blind_Signature_by_Jyoti_and_Sanjaya_10606032_10606035.pdf.
Pełny tekst źródłaChang, Yu-Wen, i 張郁文. "A New Fair Blind Signature Scheme with Message Recovery". Thesis, 2005. http://ndltd.ncl.edu.tw/handle/35848537605449483316.
Pełny tekst źródła逢甲大學
資訊工程所
93
Abstract Because of present commercial transactions most used electronizations, it needs to have anonymous function mechanisms, that’s why we need blind signatures . So Chaum had proposed the blind signature at first in 1982.The blind signature had two following characteristics: (1)anonymous (2 ) untraceable. Those properties were applied in lots of electronic payment systems. Because of two characteristics of it, it may be used for crimes like “blackmailing” and “money laundering. So, M.Stadler proposed the fair blind signature scheme to prevent these guilt problems in 1995. They have joined “The Third Trust Party” in the system, it can prevent Signer’s forge attack and trace the questionable Sender. Lee and Kim combined the “fair blind signature” and “meta-Elgamal signature scheme” and proposed”A Fair Blind Signature Scheme with Message Recovery” But, Hsien had found the security problem of the Lee-Kim scheme in 2000.Then they proposed the way that can pass the verification. Then Chung proposed an improved scheme in 2002 afterwards, but it suffered the same attack. Tsao,Chou had proposed a improved scheme based on the elliptic curves cryptosystem, and can avoid the attack of forging revocation keys. But these proposed methods all ignore the attack that Sender may cheat the TTP and Signer, and bring the security problems. Our scheme will add the interaction between Sender and TTP, and improve the Taso-Chou scheme. Then we will prevent “A New Fair Blind Signature Scheme with Message Recovery” that based on the elliptic curves.
Hung, Chen Chien, i 洪誠謙. "An unlinkable blind signature scheme for Location-Based Service". Thesis, 2008. http://ndltd.ncl.edu.tw/handle/60044406294808013207.
Pełny tekst źródła長庚大學
資訊管理學研究所
96
More and more obvious applications rely on the Location-Based Services (LBS) that offer highly personalized services to the subscriber based on their current position using the Global Positioning System (GPS) [2] and Wireless Communications. Generally, the LBS track the position of users on the network while inside the facility, and then collect this position information for the users, such as information on restaurants and stores, police stations, gas stations, hospitals, etc. When the exchange of details of service is done via an untrusted telecommunications company (TC), the privacy of the user could be in jeopardy. In this work, we propose a new scheme for user privacy in the LBS, which does not rely on a trusted TC between the user and service provider. We believe that the scheme in the LBS will provide better privacy and security for the users.
Nan, Guo Shin, i 郭信男. "Proxy Blind Signature Scheme with Proxy Signer Privacy Protection". Thesis, 2007. http://ndltd.ncl.edu.tw/handle/01524065998773469285.
Pełny tekst źródłaSun, Wei-Zhe, i 孫偉哲. "Provably Secure Randomized Blind Signature Scheme and Its Application". Thesis, 2011. http://ndltd.ncl.edu.tw/handle/46341187861514001440.
Pełny tekst źródła國立中山大學
資訊工程學系研究所
99
Due to resource-saving and efficiency consideration, electronic voting (e-voting) gradually replaces traditional paper-based voting in some developed countries. An anonymous e-voting system that can be used in elections with large electorates must meet various security requirements, such as anonymity, uncoercibility, tally correctness, unrecastability, verifiability, and so on. Especially, the uncoercibility property is an essential property which can greatly reduce the possibility of coercion and bribe. Since each voter can obtain one and only one voting receipt in an electronic voting system, coercers or bribers can enforce legal voters to show their voting receipts to identify whether the enforced voters follow their will or not. It turns out that the coercion and bribe will succeed more easily in digital environments than that in traditional paper-based voting. In this dissertation, we analyze four possible scenarios leading to coercion and discover that the randomization property is necessary to blind-signature-based e-voting systems against coercion. Based on this result, we extend our research and come up with two provably secure randomized blind signature schemes from different cryptographic primitives, which can be adopted as key techniques for an electronic voting system against coercion and bribery.
Sie, Yu-Heng, i 謝宇恆. "Security Improvement of A Proxy Blind Signature Scheme Based on DLP". Thesis, 2019. http://ndltd.ncl.edu.tw/cgi-bin/gs32/gsweb.cgi/login?o=dnclcdr&s=id=%22107NCHU5394038%22.&searchmode=basic.
Pełny tekst źródła國立中興大學
資訊科學與工程學系所
107
Nowadays, increasingly developed generation of the Internet, more and more objects are evolving into electronics, creating a developed e-commerce. Like electronic invoices, mobile payments, electronic voting, etc. These applications use encryption, decryption, and digital signatures in cryptography to satisfy security issues. Proxy blind signatures, which combine the proxy signature and the blind signature, are suitable for such applications. The scheme proposed in the paper [7], although having relatively low computation compared with previous related papers, can satisfy the security conditions that should be possessed by proxy blind signatures. However, in the verification, we play an attacker, trying to make changes to the contents of the complete file, and obtaining the corresponding fake signature by verification, the verification still holds, and the verifier cannot recognize this difference. In this paper, the encryption, decryption and verification methods in the Schnorr Signature mechanism are used to modify, and the files found in the original scheme are used for attack attempts. Finally, it is difficult to obtain the corresponding signature in the modified verification formula, and the attack difficulty is increased.
Majumdar, Aalo. "Security of Post-Quantum Multivariate Blind Signature Scheme: Revisited and Improved". Thesis, 2021. https://etd.iisc.ac.in/handle/2005/5573.
Pełny tekst źródłaSukhadarshini, Shubhanwita. "A novel blind signature scheme and its variations based on DLP". Thesis, 2012. http://ethesis.nitrkl.ac.in/4115/1/IOCMLB_thesis.pdf.
Pełny tekst źródłaCzęści książek na temat "Blind signature scheme"
Bleumer, Gerrit. "Chaum Blind Signature Scheme". W Encyclopedia of Cryptography and Security, 199–200. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_185.
Pełny tekst źródłaBellés-Muñoz, Marta, i Vanesa Daza. "Chaum Blind Signature Scheme". W Encyclopedia of Cryptography, Security and Privacy, 1–3. Berlin, Heidelberg: Springer Berlin Heidelberg, 2022. http://dx.doi.org/10.1007/978-3-642-27739-9_1752-1.
Pełny tekst źródłaOmar, Satyam, Sahadeo Padhye i Dhananjoy Dey. "Multivariate Partially Blind Signature Scheme". W Lecture Notes in Electrical Engineering, 143–55. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-7346-8_13.
Pełny tekst źródłaPetzoldt, Albrecht, Alan Szepieniec i Mohamed Saied Emam Mohamed. "A Practical Multivariate Blind Signature Scheme". W Financial Cryptography and Data Security, 437–54. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-70972-7_25.
Pełny tekst źródłaMoldovyan, Alexandr, Nikolay Moldovyan i Evgenia Novikova. "Blind 384-bit Digital Signature Scheme". W Lecture Notes in Computer Science, 77–83. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33704-8_7.
Pełny tekst źródłaRadu, Cristian, René Govaerts i Joos Vandewalle. "Witness hiding restrictive blind signature scheme". W Crytography and Coding, 283–94. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/bfb0024474.
Pełny tekst źródłaTraoré, Jacques. "Making unfair a “Fair” blind signature scheme". W Information and Communications Security, 386–97. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/bfb0028494.
Pełny tekst źródłaWu, Qianhong, Fanguo Zhang, Willy Susilo i Yi Mu. "An Efficient Static Blind Ring Signature Scheme". W Information Security and Cryptology - ICISC 2005, 410–23. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11734727_32.
Pełny tekst źródłaZhang, Yudi, Debiao He, Fangguo Zhang, Xinyi Huang i Dawei Li. "An Efficient Blind Signature Scheme Based on SM2 Signature Algorithm". W Information Security and Cryptology, 368–84. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-71852-7_25.
Pełny tekst źródłaZhang, Jianhong, Tao Wei, JianYu Zhang i Wei Zou. "Linkability of a Blind Signature Scheme and Its Improved Scheme". W Computational Science and Its Applications - ICCSA 2006, 262–70. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11751632_28.
Pełny tekst źródłaStreszczenia konferencji na temat "Blind signature scheme"
Hu, Chengyu, i Daxing Li. "Ring Blind Signature Scheme". W Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007). IEEE, 2007. http://dx.doi.org/10.1109/snpd.2007.221.
Pełny tekst źródłaZhong, Jun, i Dake He. "ACJT Group Blind Signature Scheme". W 2006 First International Conference on Communications and Networking in China. IEEE, 2006. http://dx.doi.org/10.1109/chinacom.2006.344757.
Pełny tekst źródłaZhang, Jianhong, Hua Chen i Qin Geng. "Cryptoanalysis of Certificateless Partially Blind Signature and Proxy Blind Signature Scheme". W 2009 2nd International Congress on Image and Signal Processing (CISP). IEEE, 2009. http://dx.doi.org/10.1109/cisp.2009.5303562.
Pełny tekst źródłaCui, Wei, Yang Xin, Yixian Yang i Xinxin Niu. "A New Blind Signature and Threshold Blind Signature Scheme from Pairings". W 2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007). IEEE, 2007. http://dx.doi.org/10.1109/cisw.2007.4425591.
Pełny tekst źródłaZhang, Jianhong, i Xue Liu. "An Efficient Blind Ring Signature Scheme". W 2010 WASE International Conference on Information Engineering (ICIE 2010). IEEE, 2010. http://dx.doi.org/10.1109/icie.2010.80.
Pełny tekst źródłaChen, Haibin, Lei Zhang, Junyuan Xie i Chongjun Wang. "New Efficient Certificateless Blind Signature Scheme". W 2016 IEEE Trustcom/BigDataSE/ISPA. IEEE, 2016. http://dx.doi.org/10.1109/trustcom.2016.0083.
Pełny tekst źródłaKim, Young-seol, i Jik-hyun Chang. "Provably Secure Proxy Blind Signature Scheme". W 2006 8th IEEE International Symposium on Multimedia. IEEE, 2006. http://dx.doi.org/10.1109/ism.2006.129.
Pełny tekst źródłaZhang, Jianh, i Shengnan Gao. "Efficient provable certificateless blind signature scheme". W 2010 International Conference on Networking, Sensing and Control (ICNSC). IEEE, 2010. http://dx.doi.org/10.1109/icnsc.2010.5461528.
Pełny tekst źródłaTang, P. Z., J. F. Yang i Q. L. Zhang. "A Certificateless Partially Blind Signature Scheme". W The 2015 International Conference on Software Engineering and Information Technology (SEIT2015). WORLD SCIENTIFIC, 2015. http://dx.doi.org/10.1142/9789814740104_0018.
Pełny tekst źródłaMeisheng, Yu, Wu Xiaojuan, Guan Jian i Yu Haixia. "A Certificateless Proxy Blind Signature Scheme". W 2009 WRI World Congress on Software Engineering. IEEE, 2009. http://dx.doi.org/10.1109/wcse.2009.136.
Pełny tekst źródła