军事学 >>> 军事学
搜索结果: 1-15 共查到军事学 Blind signature相关记录19条 . 查询时间(0.218 秒)
In recent years, several cryptographic scholars have proposed quantum blind signature schemes. However, their methods require the signatories and the inspectors to share common keys in advance, which ...
Multivariate Cryptography is one of the main candidates for creating post-quantum cryptosystems. Especially in the area of digital signatures, there exist many practical and secure multivariate scheme...
In this paper, we propose an Undeniable Blind Signature scheme (UBSS) based on isogenies between supersingular elliptic curves. The proposed UBSS is an extension of the Jao-Soukharev undeniable sig...
This paper introduces a new obfuscation called obfuscation of encrypted blind signature. Informally, Alice is Signer and Bob is User. Bob needs Alice to sign a message, but he does not want Alice to k...
The rapid development of quantum computing makes public key cryptosystems not based on commutative algebraic systems hot topic. Because of the non-commutativity property, the braid group with braid in...
Mu et al. proposed an electronic voting protocol and claimed that it protects voter's anonymity, detects double voting and authenticates eligible voters. It has been shown that it does not protect v...
A proxy blind signature scheme is the combination of proxy signature and blind signature scheme. In 2009,Verma proposed a proxy blind signature scheme over braid groups. Verma claimed that the prop...
Blindness and unforgeability are two essential security requirements of a secure blind signature scheme. Blindness means that after interacting with various users, the signer can never be able to l...
A blind signature scheme is a cryptographic protocol for obtaining a signature from a signer such that the signer’s view of the protocol cannot be linked to the resulting message signature pair. In ...
We introduce a new class of computational problems which we call the “one-more-RSAinversion” problems. Our main result is that two problems in this class, which we call the chosen-target and known-t...
We propose a robust proactive threshold signature scheme, a multisignature scheme and a blind signature scheme which work in any Gap Die-Hellman (GDH) group (where the Computational Die-Hellman pr...
Proxy signatures are very useful tools when one needs to delegate his/her signing capability to other party. After Mambo et al:’s first scheme was announced, many proxy signature schemes and various...
Blind signature is the concept to ensure anonymity of e-coins. Untracebility and unlinkability are two main properties of real coins, which require mimicking electronically. Whenever a user is permitt...
In the paper, we analyze two signature schemes. The ¯rst is a (tj ; t; n) threshold group signature scheme proposed by Shi and Feng in [1]. The second is a fair blind signature scheme proposed ...
Duc et al. proposed a forward-secure blind signature scheme in [1]. They claimed that the scheme is constructed from the provably secure Okamoto- Guilou-Quisquater blind signature scheme. But we rec...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...