J4

• Original Articles • Previous Articles     Next Articles

Designs of several partial blind signatures and the security analyses

ZHANG Tong1;WANG Yu-min2

  

  1. (1. Northwest Inst. of Nuclear Technology, Xi'an 710024, China;
    2. State Key Lab. of Integrated Service Networks, Xidian Univ., Xi'an 710071, China)
  • Received:1900-01-01 Revised:1900-01-01 Online:2004-12-20 Published:2004-12-20

Abstract: The blind signature is used for hiding the message to be signed and hiding the identities of message providers. The concept and protocol of the partial blind signature are explained after the analysis of teh inherent defects of the blind signature. Three partial blind signature schemes based on the discrete logarithm are introduced and their security are analysed.

Key words: partial blind, arithmetic design, security analyses

CLC Number: 

  • TN918.1