Suggested Topics within your search.
Suggested Topics within your search.
Attribute-based
1
Attribute-based signatures
1
Authentication
1
Blind signatures
1
Computational efficiency
1
Efficiency
1
Elliptic curve cryptography
1
Elliptic curve discrete logarithm problem
1
Elliptic curve discrete logarithm problems
1
Geometry
1
History of engineering and technology
1
Key policies
1
Key policy attribute-based signature
1
LSSS matrix
1
Linear secret sharing scheme matrix
1
Linear secret sharing schemes
1
Matrix algebra
1
Public key cryptography
1
Scheme matrices
1
blind signature
1
elliptic curve cryptography (ECC)
1
elliptic curve discrete logarithm problem (ECDLP)
1
key policy attribute-based signature
1
-
1by Schröder, Dominique“...Blind signature schemes provide the functionality of a carbon copy envelope: The user (receiver...”
Published 2010
Get full text
Get full text
Others -
2
-
3
-
4“..., we propose a new blind signature scheme based on ElGamal signatures and design an anonymous...”
Get full text
Others -
5“... is achieved by blind signature. Because of blind signatures have anonymity and untraceability, many electronic...”
Get full text
Others -
6“... blind signature scheme based on the discrete logarithm problem. The original structure includes...”
Get full text
Others -
7by Nordli, Børge“...We present the latest formal security definitions for blind signature schemes and for group...”
Published 2007
Get full text
Others -
8“...碩士 === 國立雲林科技大學 === 電子與資訊工程研究所碩士班 === 91 === In this paper, a group blind signature scheme...”
Get full text
Others -
9“...碩士 === 國立中興大學 === 資訊科學研究所 === 90 === Blind signature could be use to electric payment system...”
Get full text
Others -
10
-
11“... introduced the first blind signature scheme based on RSA digital signature scheme in 1982. Although Chaum...”
Get full text
Others -
12“... resolved. Besides, based on the AQS scheme, we further present the arbitrated quantum blind signature (AQBS...”
Get full text
Others -
13
-
14“... signature. In the blind signature scheme, the requester requests the signer to sign on a blinded message...”
Get full text
Others -
15
-
16
-
17“...碩士 === 國防管理學院 === 國防資訊研究所 === 87 === We propose a multi-blind signature system in a...”
Get full text
Others -
18“... for the participants to preserve their privacy. Thus, the digital blind signature scheme is proposed for this purpose...”
Get full text
Others -
19
-
20“... with such feature, proxy blind signature is a cornerstone to protect users’ privacy. However, the signature based...”
Get full text
Article