Designs of several partial blind signatures and the security analyses
J4
• Original Articles • Previous Articles Next Articles
ZHANG Tong1;WANG Yu-min2
Received:
Revised:
Online:
Published:
Abstract: The blind signature is used for hiding the message to be signed and hiding the identities of message providers. The concept and protocol of the partial blind signature are explained after the analysis of teh inherent defects of the blind signature. Three partial blind signature schemes based on the discrete logarithm are introduced and their security are analysed.
Key words: partial blind, arithmetic design, security analyses
CLC Number:
ZHANG Tong1;WANG Yu-min2.
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://journal.xidian.edu.cn/xdxb/EN/
https://journal.xidian.edu.cn/xdxb/EN/Y2004/V31/I6/963
Cited
Radar HRRP recognition based on the kernel matching pursuit classifier
Conformal boundary scheme in FDTD computation of satellite model scattering